Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks

Published: 14 November 2014 Publication History

Abstract

In multi-hop wireless ad hoc networks, nodes not in direct range rely on intermediate nodes to communicate. In order to preserve its limited resources or to launch a DoS attack, an intermediate node drops packets going through it instead to forward them to its successor. In this paper, we deal with this misbehavior called black hole attack, and we propose an authenticated end-to-end acknowledgment based approach in order to check the correct forwarding of packets by intermediate nodes. Our approach detects the black hole conducted in simple or cooperative manner, the modification and the replay of messages attacks. Through simulation using OPNET simulator, we show the detection efficiency and evaluate the performance of our approach in both proactive and reactive routing based networks in terms of end-to-end delay and network load. Also, we compare the approach we propose with 2-hop ACK and the watchdog approaches in terms of detection ratio, delivery ratio and additional overhead.

References

[1]
A. Baadache, A. Belmehdi, Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks, Int. J. Comput. Sci. Inform. Security, 7 (2010) 10-16.
[2]
S. Sharma, R. Gupta, Simulation study of blackhole attack in the mobile ad hoc networks, J. Eng. Sci. Technol., 4 (2009) 243-250.
[3]
D. Djenouri, N. Badache, On eliminating packet droppers in MANET: a modular solution, Ad Hoc Networks, 7 (2009) 1243-1258.
[4]
P.N. Raj, P.B. Swadas, DPRAODV: a dynamic learning system against blackhole aattack in AODV based MANET, Int. J. Comput. Sci. Issues, 2 (2009) 54-59.
[5]
D. Djenouri, N. Badache, Struggling against selfishness and black hole attacks in manets, Wireless Commun. Mobile Comput. (WCMC), 8 (2008) 689-704.
[6]
H. Weerasinghe, H. Fu, Preventing cooperative black hole attacks in mobile ad hoc networks: simulation, implementation and evaluation, Int. J. Software Eng. Applicat., 2 (2008) 39-54.
[7]
L. Tamilselvan, V. Sankaranarayanan, Prevention of cooperative black hole attack in MANET, J. Networks, 3 (2008) 13-20.
[8]
P. Agrawal, R.K. Ghosh, S.K. Das, Cooperative black and gray hole attacks in mobile ad hoc networks, in: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication (ICUIMC'08), 2008, pp. 310-314.
[9]
S. Djahel, F. Naıt-Abdesselam, A. Khokhar, An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol, in: Proceedings of IEEE International Conference on Communications (IEEE ICC'08), 2008, pp. 2780-2785.
[10]
B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour, A survey of routing attacks in mobile ad hoc networks, in: IEEE Wireless Communications, 2007, pp. 85-91.
[11]
S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, Y. Nemoto, Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method, Int. J. Network Security, 5 (2007) 338-346.
[12]
J.S. Li, C.T. Lee, Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks, Comput. Commun., 29 (2006) 1121-1132.
[13]
C. Hongsong, J. Zhenzhou, H. Mingzeng, A novel security agent scheme for AODV routing protocol based on thread state transition, Asian J. Informat. Technol., 5 (2006) 54-60.
[14]
D. Djenouri, N. Badache, Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks, IWSOS/EuroNGI, 2006, pp. 163-176.
[15]
S. Buchegger, J.Y. Le-Boudec, A robust reputation system for p2p and mobile ad-hoc networks, in: Second Workshop on the Economics of Peer-to-Peer Systems, Harvard University, MA, USA, 2004.
[16]
Y. Hu, B.J. David, P. Adrian, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, J. Ad Hoc Networks, 1 (2003) 175-192.
[17]
S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, K. Nygard, Prevention of cooperative black hole attack in wireless ad hoc networks, in: International Conference on Wireless Networks (ICWN'03), Las Vegas, Nevada, USA, 2003.
[18]
C. Perkins, E.B. Royer, S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, RFC: 3561 (Experimental), IETF, July, 2003.
[19]
T. Clausen, P. Jacquet, Optimized Link State Routing Protocol (OLSR), RFC: 3626 (Experimental), IETF, Oct, 2003.
[20]
H. Deng, W. Li, D.P. Agrawal, Routing security in wireless ad hoc networks, Commun. Mag., IEEE, 40(10) (2002) 70-75.
[21]
B. Awerbuch, D. Holmer, C. Nita-Rotaru, H. Rubens, An on-demand secure routing protocol resilient to byzantine failures, in: ACM Workshop on Wireless Security (WiSe'02), Atlanta, Georgia, 2002.
[22]
Y. Seung, N. Prasad, K. Robin, Security-aware ad hoc routing for wireless networks, in: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc'01), 2001, pp. 299-302.
[23]
D. Eastlake, P. Jones, US Secure Hash Algorithm 1 (SHA1), RFC: 3174 (Informational), Network Working Group, Sep, 2001.
[24]
S. Marti, T.J. Giuli, L. Kevin, B. Mary, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom'00), 2000, pp. 255-265.
[25]
Opnet web site: <http://www.opnet.com/>.

Cited By

View all
  • (2020)Survey of Secure Routing Protocols for Wireless Ad Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-020-07376-1114:1(483-517)Online publication date: 18-Apr-2020
  • (2019)Random-Session and K-Neighbour Based Suspected Node Analysis Approach for Cooperative Blackhole Detection in MANETWireless Personal Communications: An International Journal10.1007/s11277-019-06711-5110:1(45-68)Online publication date: 17-Aug-2019
  • (2019)Malicious Cluster Head Detection Mechanism in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-019-06512-w108:4(2117-2135)Online publication date: 1-Oct-2019
  • Show More Cited By
  1. Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Computer Networks: The International Journal of Computer and Telecommunications Networking
        Computer Networks: The International Journal of Computer and Telecommunications Networking  Volume 73, Issue C
        November 2014
        335 pages

        Publisher

        Elsevier North-Holland, Inc.

        United States

        Publication History

        Published: 14 November 2014

        Author Tags

        1. Cooperative black hole
        2. Routing protocol security
        3. Simple black hole
        4. Wireless ad hoc network

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 09 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Survey of Secure Routing Protocols for Wireless Ad Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-020-07376-1114:1(483-517)Online publication date: 18-Apr-2020
        • (2019)Random-Session and K-Neighbour Based Suspected Node Analysis Approach for Cooperative Blackhole Detection in MANETWireless Personal Communications: An International Journal10.1007/s11277-019-06711-5110:1(45-68)Online publication date: 17-Aug-2019
        • (2019)Malicious Cluster Head Detection Mechanism in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-019-06512-w108:4(2117-2135)Online publication date: 1-Oct-2019
        • (2017)HSecGRJournal of Network and Computer Applications10.1016/j.jnca.2016.12.02880:C(189-199)Online publication date: 15-Feb-2017
        • (2015)A model of data forwarding in MANETs for lightweight detection of malicious packet droppingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2015.05.01287:C(44-58)Online publication date: 20-Jul-2015

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media