Skip to main content
Erschienen in: Wireless Networks 8/2018

26.04.2017

DEBH: detecting and eliminating black holes in mobile ad hoc network

verfasst von: Ali Dorri, Soroush Vaseghi, Omid Gharib

Erschienen in: Wireless Networks | Ausgabe 8/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security in mobile ad hoc network (MANET) is one of the key challenges due to its special features e.g. hop-by-hop communications, dynamic topology, and open network boundary that received tremendous attention by scholars. Traditional security methods are not applicable in MANET due to its special properties. In this paper, a novel approach called detecting and eliminating black holes (DEBH) is proposed that uses a data control packet and an additional black hole check table for detecting and eliminating malicious nodes. Benefiting from trustable nodes, the processing overhead of the security method decreases by passing time. Ad hoc on-demand distance vector (AODV) routing protocol is used as the routing protocol in our design. After finding the freshest path using AODV, our design checks the safety of selected path. In case of detecting any malicious node, it is isolated from the entire network by broadcasting a packet that contains the ID of malicious nodes. Simulation results show that DEBH increases network throughput and decreases packet overhead and delay in comparison with other studied approaches. Moreover, DEBH is able to detect all active malicious nodes which generates fault routing information.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63, 4647–4658.CrossRef Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63, 4647–4658.CrossRef
2.
Zurück zum Zitat Zehua, W., Yuanzhu, C., & Cheng, L. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 859–868.CrossRef Zehua, W., Yuanzhu, C., & Cheng, L. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 859–868.CrossRef
3.
Zurück zum Zitat Dorri, Ali, & Kamel, Seyed Reza. (2015). A fuzzy congestion controller to detect and balance congestion in WSN. International Journal of Wireless & Mobile Networks, 7(1), 137.CrossRef Dorri, Ali, & Kamel, Seyed Reza. (2015). A fuzzy congestion controller to detect and balance congestion in WSN. International Journal of Wireless & Mobile Networks, 7(1), 137.CrossRef
4.
Zurück zum Zitat Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15, 2027–2045.CrossRef Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15, 2027–2045.CrossRef
5.
Zurück zum Zitat Dorri, A., Kamel, R., & Kheyrkhah, E. (2014). An analyses in security challenges in mobile ad hoc network. Presented at the sixth international conference on Wireless and Mobile networks (WiMoNe 2014). Dorri, A., Kamel, R., & Kheyrkhah, E. (2014). An analyses in security challenges in mobile ad hoc network. Presented at the sixth international conference on Wireless and Mobile networks (WiMoNe 2014).
6.
Zurück zum Zitat Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: A survey. International Journal of Computer Science and Engineering Survey (IJCSES), 6(1), 15–29.CrossRef Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: A survey. International Journal of Computer Science and Engineering Survey (IJCSES), 6(1), 15–29.CrossRef
7.
Zurück zum Zitat Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4, 212–232.CrossRef Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4, 212–232.CrossRef
8.
Zurück zum Zitat Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Third international conference on advanced computing and communication technologies (ACCT), 2013 (pp. 254–260). Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Third international conference on advanced computing and communication technologies (ACCT), 2013 (pp. 254–260).
9.
Zurück zum Zitat Kalwar, S. (2010). Introduction to reactive protocol. IEEE Potentials, 29, 34–35.CrossRef Kalwar, S. (2010). Introduction to reactive protocol. IEEE Potentials, 29, 34–35.CrossRef
10.
Zurück zum Zitat Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & Tutorials, 10, 78–93.CrossRef Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & Tutorials, 10, 78–93.CrossRef
11.
Zurück zum Zitat Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.CrossRef Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.CrossRef
12.
Zurück zum Zitat Kamatchi, V., Mukesh, R., & Rajakumar, (2013). Securing data from black hole attack using AODV routing for mobile ad hoc networks. In N. Meghanathan, D. Nagamalai, & N. Chaki (Eds.), Advances in computing and information technology (Vol. 177, pp. 365–373). Berlin: Springer.CrossRef Kamatchi, V., Mukesh, R., & Rajakumar, (2013). Securing data from black hole attack using AODV routing for mobile ad hoc networks. In N. Meghanathan, D. Nagamalai, & N. Chaki (Eds.), Advances in computing and information technology (Vol. 177, pp. 365–373). Berlin: Springer.CrossRef
13.
Zurück zum Zitat Banerjee, S., Sardar, M., & Majumder, K. (2014). AODV based black-hole attack mitigation in MANET. In S. C. Satapathy, S. K. Udgata, & B. N. Biswal (Eds.), Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA) 2013 (Vol. 247, pp. 345–352). Berlin: Springer International Publishing.CrossRef Banerjee, S., Sardar, M., & Majumder, K. (2014). AODV based black-hole attack mitigation in MANET. In S. C. Satapathy, S. K. Udgata, & B. N. Biswal (Eds.), Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA) 2013 (Vol. 247, pp. 345–352). Berlin: Springer International Publishing.CrossRef
14.
Zurück zum Zitat Lo, N.-W., & Liu, F.-L. (2013). A secure routing protocol to prevent cooperative black hole attack in MANET. In J. Juang & Y.-C. Huang (Eds.), Intelligent technologies and engineering systems (Vol. 234, pp. 59–65). New York: Springer.CrossRef Lo, N.-W., & Liu, F.-L. (2013). A secure routing protocol to prevent cooperative black hole attack in MANET. In J. Juang & Y.-C. Huang (Eds.), Intelligent technologies and engineering systems (Vol. 234, pp. 59–65). New York: Springer.CrossRef
15.
Zurück zum Zitat Jaisankar, N., Saravanan, R., & Swamy, K. D. (2010). A novel security approach for detecting black hole attack in MANET. In V. Das, R. Vijayakumar, N. Debnath, J. Stephen, N. Meghanathan, S. Sankaranarayanan, et al. (Eds.), Information processing and management (Vol. 70, pp. 217–223). Berlin: Springer.CrossRef Jaisankar, N., Saravanan, R., & Swamy, K. D. (2010). A novel security approach for detecting black hole attack in MANET. In V. Das, R. Vijayakumar, N. Debnath, J. Stephen, N. Meghanathan, S. Sankaranarayanan, et al. (Eds.), Information processing and management (Vol. 70, pp. 217–223). Berlin: Springer.CrossRef
16.
Zurück zum Zitat Dorri, A., & Nikdel, H. (2013). A new approach for detecting and eliminating cooperative black hole nodes in MANET. Presented at the 7th international conference on information and knowledge technology, Urima. Dorri, A., & Nikdel, H. (2013). A new approach for detecting and eliminating cooperative black hole nodes in MANET. Presented at the 7th international conference on information and knowledge technology, Urima.
17.
Zurück zum Zitat Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014) Prevention of black hole attack in AODV routing algorithm of MANET using trust based computing. International Journal of Computer Science and Information Technologies, 5, 3254–3258. Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014) Prevention of black hole attack in AODV routing algorithm of MANET using trust based computing. International Journal of Computer Science and Information Technologies, 5, 3254–3258.
18.
Zurück zum Zitat Chhari, V., Singh, R., & Dhakad, S. S. (2014). Enhanced and more secure AODV routing protocol to avoid black hole attack in MANET. IJCSNT. Chhari, V., Singh, R., & Dhakad, S. S. (2014). Enhanced and more secure AODV routing protocol to avoid black hole attack in MANET. IJCSNT.
20.
Zurück zum Zitat Varshney, T., Sharma, T., & Sharma, P. (2014). Implementation of watchdog protocol with AODV in mobile ad hoc network. In Fourth international conference on communication systems and network technologies (CSNT), 2014 (pp. 217–221). Varshney, T., Sharma, T., & Sharma, P. (2014). Implementation of watchdog protocol with AODV in mobile ad hoc network. In Fourth international conference on communication systems and network technologies (CSNT), 2014 (pp. 217–221).
Metadaten
Titel
DEBH: detecting and eliminating black holes in mobile ad hoc network
verfasst von
Ali Dorri
Soroush Vaseghi
Omid Gharib
Publikationsdatum
26.04.2017
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 8/2018
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1516-z

Weitere Artikel der Ausgabe 8/2018

Wireless Networks 8/2018 Zur Ausgabe

Neuer Inhalt