Abstract
Mobile adhoc networks (MANETs) suffer from various types of security attacks. In this paper, a novel probabilistic approach is proposed to detect and to isolate the Black Hole attack from MANET. Routing algorithms that are used nowadays are not designed to handle these types of attacks. This paper proposes a technique which is known as NHBADI, which uses Honeypot methodology to detect and isolate Black Hole attacks. Unlike existing techniques, the proposed Honeypot technique enhances the security of the MANET by reducing the network overhead. To measure the effectiveness of the proposed system, NS-2 simulator is used. The proposed technique not only detects malicious Black Hole nodes but also isolates the vulnerable Black Hole nodes from the network. The proposed NHBADI scheme reduces network overhead, normalized routing load and packet drop ratio.
Similar content being viewed by others
References
Agrawal, P, Ghosh, R. K., & Das, S.K. (2008). Cooperative black and gray hole attacks in MANETs. In Proceedings of ACM second international conference on ubiquitous information management and communication, pp. 310–314.
Nasipuri, A, Casaneda, R., & Das, S. R. (1999). On-demand multipath routing for MANETs. In Proceedings of IEEE INFOCOM, pp. 64–70.
Ning, P., & Sun, K. (2003). How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols. In Proceedings of the fourth annual IEEE information assurance workshop, pp. 60–67.
Dorri, A., Kamel, S. R., & Kheyrkhah, E. (2015). Security challenges in mobile adhoc networks: A survey. International Journal of Computer Science and Engineering Survey (IJCSES), 6(1), 15–29.
Pranusha, A., & Murali, G. (2015). A hybrid key management scheme for secure MANET communications. International Journal of Research in Engineering and Technology, 4(38–40), 2015.
Alem, Y. F., Xuan, Z. C. (2010). Preventing Black Hole attack in mobile ad hoc networks using anomaly detection. In Proceedings of second international conference on future computer and communication (ICFCC), pp. 21–24.
Basabaaa, A., Sheltamia, T., & Shakshukib, E. (2014). Implementation of A3ACKs intrusion detection system under various mobility speeds. Proceedings of Computer Science, 32, 1–10.
Dhir, A., & Sengupta, J. (2009). Security-aware optimized link routing protocol for mobile ad-hoc networks. KSII Transactions on Internet and Information Systems, 3(1), 52–83.
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Journal of Ad Hoc Networks, 1(3), 293–315.
Tang, Y., & Chen, S. Defending against internet worms: A signature-based approach. In Proceedings of IEEE INFOCOM, Vol. 2, pp. 1384–1394.
Djahel, S., Nait-abdesselam, F., & Zhang, Zonghua. (2008). Mitigating packet dropping problem in MANETs: Proposals and challenges. IEEE Communication Survey and Tutorials, 13(4), 658–672.
Patel, M., & Sharma, S. (2013). Detection of malicious attack in MANET a behavioural approach. In Proceedings of IEEE third international conference on advance computing, pp. 388–393.
Wu, C. Y., Wu, T. K., Cheng, R. H., & Chang, S. C. (2007). A distributed and cooperative Black Hole node detection and elimination mechanism for ad hoc network. Lecture Notes in Computer Science, 4819, 538–549.
Mistry, N., Jinwala, D. C., & Zaveri, M. (2010). Improving AODV protocol against Black Hole attacks. In Proceedings of international multiconference of engineers and computer scientists, pp. 17–19.
Su, M. Y. (2011). Prevention of selective Black Hole attacks on MANETs through intrusion detection systems. Journal of Computer Communication, 34(1), 107–117.
Nadeem, A., & Howarth, M. (2013). Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Proceedings of Springer Telecommunication Systems, 52(4), 2047–2058.
Rutvji, H. J., Patel, S. J., & Jinwala, D. C. (2012). A novel approach for GrayHole and BlackHole attacks in mobile ad hoc networks. In Proceedings of IEEE advanced computing & communication technologies, pp. 556–560.
Hoepers, C., Vijaykumar, N. L., & Montes, A. (2008). HIDEF: A data exchange format for information collected in Honeypots and honey nets. INFOCOMP Journal of Computer Science, 7(1), 87–96.
Wang, H., & Chen, Q (2010). Design of cooperative deployment in distributed honey net system. In Proceedings of the international conference on computer supported cooperative work in design, pp. 711–716.
Nakayama, H., Kurosawa, S., Jamalipour, S., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV based MANETs. IEEE Transactions on Vehicular Technology, 58(5), 2471–2481.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rajesh Babu, M., Usha, G. A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET. Wireless Pers Commun 90, 831–845 (2016). https://doi.org/10.1007/s11277-016-3229-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3229-5