Skip to main content
Top

2015 | OriginalPaper | Chapter

Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks

Authors : Muhammad Imran, Farrukh Aslam Khan, Haider Abbas, Mohsin Iftikhar

Published in: Ad-hoc Networks and Wireless

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile Ad hoc Networks (MANETs) are vulnerable to external threats due to their open access and lack of central point of administration. Black hole attack is a well-known routing attack, in which an attacker node replies to the Route Requests (RREQs) by pretending itself as a neighbor of the destination node in order to get the data. These days, it has become very challenging to secure a network from such attacks. In this paper, we propose a Detection and Prevention System (DPS) to detect black hole attack in MANETs. For this purpose, we deploy some special nodes in the network called DPS nodes, which continuously monitor RREQs broadcasted by other nodes. DPS nodes detect the malicious nodes by observing the behavior of their neighbors. When a node with suspicious behavior is found, DPS node declares that suspicious node as black hole node by broadcasting a threat message. Hence, the black hole node is isolated from the network by rejecting all types of data from it. The simulations in NS-2 show that our proposed DPS mechanism considerably reduces the packet drop ratio with a very low false positive rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1999), New Orleans, LA, USA, pp. 90–100 (1999) Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1999), New Orleans, LA, USA, pp. 90–100 (1999)
2.
go back to reference Mohebi, A., Scott, S.: A survey on detecting black-hole methods in mobile ad hoc networks. Int. J. Innovative Ideas. 13(2), 55–63 (2013) Mohebi, A., Scott, S.: A survey on detecting black-hole methods in mobile ad hoc networks. Int. J. Innovative Ideas. 13(2), 55–63 (2013)
3.
go back to reference Mandala, S., Abdullah, A.H., Ismail, A.S., Haron, H., Ngadi, M.A., Coulibaly, Y.: A review of blackhole attack in mobile ad hoc network. In: 3rd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), Bandung, pp. 339–344 (2013) Mandala, S., Abdullah, A.H., Ismail, A.S., Haron, H., Ngadi, M.A., Coulibaly, Y.: A review of blackhole attack in mobile ad hoc network. In: 3rd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), Bandung, pp. 339–344 (2013)
4.
go back to reference Tseng, F.-H., Chou, L.-D., Chao, H.-C.: A survey of black hole attacks in wireless mobile ad hoc networks. Hum.-Centric Comput. Inf. Sci. 1(4), 1–16 (2011) Tseng, F.-H., Chou, L.-D., Chao, H.-C.: A survey of black hole attacks in wireless mobile ad hoc networks. Hum.-Centric Comput. Inf. Sci. 1(4), 1–16 (2011)
5.
go back to reference Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: International Conference on Wireless Networks (ICWN 2003), Las Vegas, Nevada, USA (2003) Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: International Conference on Wireless Networks (ICWN 2003), Las Vegas, Nevada, USA (2003)
6.
go back to reference Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int. J. Netw. Secur. 5(3), 338–346 (2007) Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int. J. Netw. Secur. 5(3), 338–346 (2007)
7.
go back to reference Tamilselvan, L., Sankaranarayanan, V.: Prevention of co-operative black hole attack in MANET. J. Netw. 3(5), 13–20 (2008) Tamilselvan, L., Sankaranarayanan, V.: Prevention of co-operative black hole attack in MANET. J. Netw. 3(5), 13–20 (2008)
8.
go back to reference Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. Int. J. Softw. Eng. Appl. 2(3), 39–54 (2008) Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. Int. J. Softw. Eng. Appl. 2(3), 39–54 (2008)
9.
go back to reference Su, M.-Y., Chiang, K.-L., Liao, W.-C.: Mitigation of black-hole nodes in mobile ad hoc networks. In: International Symposium on Parallel and Distributed Processing with Applications (ISPA), Taipei, Taiwan, pp. 162–167 (2010) Su, M.-Y., Chiang, K.-L., Liao, W.-C.: Mitigation of black-hole nodes in mobile ad hoc networks. In: International Symposium on Parallel and Distributed Processing with Applications (ISPA), Taipei, Taiwan, pp. 162–167 (2010)
10.
go back to reference Gupta, S., Kar, S., Dharmaraja, S.: BAAP: blackhole attack avoidance protocol for wireless network. In: International Conference on Computer and Communication Technology (ICCCT), Allahabad, India, pp. 468–473 (2011) Gupta, S., Kar, S., Dharmaraja, S.: BAAP: blackhole attack avoidance protocol for wireless network. In: International Conference on Computer and Communication Technology (ICCCT), Allahabad, India, pp. 468–473 (2011)
11.
go back to reference Su, M.-Y.: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput. Commun. 34(1), 107–117 (2011)CrossRef Su, M.-Y.: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput. Commun. 34(1), 107–117 (2011)CrossRef
12.
go back to reference Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: A novel approach for GrayHole and BlackHole attacks in mobile ad-hoc networks. In: Second International Conference on Advanced Computing and Communication Technologies (ACCT), Haryana, India, pp. 556–560 (2012) Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: A novel approach for GrayHole and BlackHole attacks in mobile ad-hoc networks. In: Second International Conference on Advanced Computing and Communication Technologies (ACCT), Haryana, India, pp. 556–560 (2012)
13.
go back to reference Chatterjee, N., Mandal, J.K.: Detection of blackhole behaviour using triangular encryption in NS2. In: 1st International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), Procedia Technology, vol. 10, pp. 524–529 (2013) Chatterjee, N., Mandal, J.K.: Detection of blackhole behaviour using triangular encryption in NS2. In: 1st International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), Procedia Technology, vol. 10, pp. 524–529 (2013)
14.
go back to reference Tan, S., Kim, K.: Secure route discovery for preventing black hole attacks on AODV-based MANETs. In: International Conference on ICT Convergence (ICTC), Jeju, Korea, pp. 1027–1032 (2013) Tan, S., Kim, K.: Secure route discovery for preventing black hole attacks on AODV-based MANETs. In: International Conference on ICT Convergence (ICTC), Jeju, Korea, pp. 1027–1032 (2013)
15.
go back to reference Thachil, F., Shet, K.C.: A trust-based approach for AODV protocol to mitigate blackhole attack in MANET. In: International Conference on Computing Sciences (ICCS), Phagwara, pp. 281–285 (2012) Thachil, F., Shet, K.C.: A trust-based approach for AODV protocol to mitigate blackhole attack in MANET. In: International Conference on Computing Sciences (ICCS), Phagwara, pp. 281–285 (2012)
16.
go back to reference Zhang, X.Y., Sekiya, Y., Wakahara, Y.: Proposal of a method to detect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems, Athens, Greece, pp. 1–6 (2009) Zhang, X.Y., Sekiya, Y., Wakahara, Y.: Proposal of a method to detect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems, Athens, Greece, pp. 1–6 (2009)
17.
go back to reference Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)CrossRef Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)CrossRef
18.
go back to reference Kant, R., Gupta, S., Khatter, H.: A literature survey on black hole attacks on AODV protocol in MANET. Int. J. Comput. Appl. 80(16), 22–26 (2013) Kant, R., Gupta, S., Khatter, H.: A literature survey on black hole attacks on AODV protocol in MANET. Int. J. Comput. Appl. 80(16), 22–26 (2013)
19.
go back to reference Ehsan, H., Khan, F.A.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, pp. 1181–1187 (2012) Ehsan, H., Khan, F.A.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, pp. 1181–1187 (2012)
20.
go back to reference Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: IEEE Radio and Wireless Conference, Boston, MA, USA, pp. 75–78 (2003) Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: IEEE Radio and Wireless Conference, Boston, MA, USA, pp. 75–78 (2003)
Metadata
Title
Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks
Authors
Muhammad Imran
Farrukh Aslam Khan
Haider Abbas
Mohsin Iftikhar
Copyright Year
2015
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-46338-3_10

Premium Partner