Skip to main content
Top

2013 | OriginalPaper | Chapter

95. IDS Scheme for Blackhole Attack on MANETs

Authors : Young-Dong Kim, Dong-Ill Kim

Published in: Future Information Communication Technology and Applications

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Blackhole attack is one of typical intrusion to routing function on Mobile Ad-hoc Network(MANET)s. Blackhole attacking may cause severe transmission performance deterioration of network, because of absorption of all packets be delivered to destination and all routing messages be propagated to nodes on MANETs. Detecting and avoiding of blackhole attacking from malicious is very important to keep network performance. In this paper, an Intrusion Detection System (IDS) scheme for blackhole attack on MANETs is suggested with pre-routing. Transmission performance of this suggested scheme is shown with NS-2 simulations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hongmei D, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75CrossRef Hongmei D, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75CrossRef
2.
go back to reference Bala A, Kumari R, Singh J (2010) Investigation of blackhole attack on AODV in MANET. J Emerg Technol Web Intell 2(2):96–100 Bala A, Kumari R, Singh J (2010) Investigation of blackhole attack on AODV in MANET. J Emerg Technol Web Intell 2(2):96–100
3.
go back to reference Tseng F-H, Chou L-D, Chao H-C (2011) A survey of black hole attacks in wireless mobile ad hoc networks. J HCIS 1(1) Tseng F-H, Chou L-D, Chao H-C (2011) A survey of black hole attacks in wireless mobile ad hoc networks. J HCIS 1(1)
4.
go back to reference Kim YD (2012) Transmission performance of VoIP traffic under blackhole attack on MANET. Proceedings of KIICSC 2011, vol 15, no 2, pp 637–640 Kim YD (2012) Transmission performance of VoIP traffic under blackhole attack on MANET. Proceedings of KIICSC 2011, vol 15, no 2, pp 637–640
5.
go back to reference Al-Shurman M, Yoo SM, Park S (2004) Black hole attack in mobile ad hoc networks. Proceedings of the 42nd southeast regional conference, ACM-SE 42, pp 96–97 (2004) Al-Shurman M, Yoo SM, Park S (2004) Black hole attack in mobile ad hoc networks. Proceedings of the 42nd southeast regional conference, ACM-SE 42, pp 96–97 (2004)
6.
go back to reference Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int J Netw Secur 5(3):338–346 Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int J Netw Secur 5(3):338–346
7.
go back to reference Venkatraman L, Agrawal DP (2003) Strategies for enhancing routing security in protocols for mobile ad hoc networks. J Parallel Distrib comput 63(2):214–227MATHCrossRef Venkatraman L, Agrawal DP (2003) Strategies for enhancing routing security in protocols for mobile ad hoc networks. J Parallel Distrib comput 63(2):214–227MATHCrossRef
8.
go back to reference Kim YD (2012) Transmission performance of application service traffic on MANET with IDS. Proceedings of KIICSC 2012, vol 16, no 1, pp 584–587 Kim YD (2012) Transmission performance of application service traffic on MANET with IDS. Proceedings of KIICSC 2012, vol 16, no 1, pp 584–587
9.
go back to reference Himral L, Vig V, Chand N (2011) Preventing AODV routing protocol from black hole attack. IJEST 3(5):3927–3932 Himral L, Vig V, Chand N (2011) Preventing AODV routing protocol from black hole attack. IJEST 3(5):3927–3932
10.
go back to reference Weerasings H, Fu H (2008) Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. Int J Softw Eng Appl 2(3):39–54 Weerasings H, Fu H (2008) Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. Int J Softw Eng Appl 2(3):39–54
12.
go back to reference Dokurer S (2006) Simulation of black hole attack in wireless ad-hoc networks. Mater’s thesis, Atilim University Dokurer S (2006) Simulation of black hole attack in wireless ad-hoc networks. Mater’s thesis, Atilim University
13.
go back to reference Dokurer S, Erten YM, Acar CE (2007) Performance analysis of ad-hoc networks under black hole attacks. Proceedings of IEEE southeastcon 2007, pp 148–153 Dokurer S, Erten YM, Acar CE (2007) Performance analysis of ad-hoc networks under black hole attacks. Proceedings of IEEE southeastcon 2007, pp 148–153
Metadata
Title
IDS Scheme for Blackhole Attack on MANETs
Authors
Young-Dong Kim
Dong-Ill Kim
Copyright Year
2013
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6516-0_95