skip to main content
10.1145/2905055.2905133acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks

Authors Info & Claims
Published:04 March 2016Publication History

ABSTRACT

A mobile ad hoc network (MANET) is an infrastructure-less network of various mobile devices and generally known for its self configuring behavior. MANET can communicate over relatively bandwidth constrained wireless links. Due to limited bandwidth battery power and dynamic network, topology routing in MANET is a challenging issue. Collaborative attacks are particularly serious issues in MANET. Attacks are liable to occur if routing algorithms fail to detect prone threats and to find as well as remove malicious nodes. Our objective is to examine and improve the performance of network diminished by variety of attacks. The performance of MANET network is examined under Black hole, Wormhole and Sybil attacks using Performance matrices and then major issues which are related to these attacks are addressed.

References

  1. M. Al-Shurman, S.-M. Yoo, and S. Park. Black hole attack in mobile ad hoc networks. In Proceedings of the 42Nd Annual Southeast Regional Conference, ACM-SE 42, pages 96--97, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K. Biswas, M. L. Ali, K. Biswas, M. L. Ali, and R. Gustavsson. Security threats in mobile ad hoc network. Master's thesis, Blekinge Institute of Technology, Sweden, 2007.Google ScholarGoogle Scholar
  3. Y. chun Hu. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM 2003,, San Francisco, CA, USA, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  4. H. Deng, W. Li, and D. P. Agrawal. Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10):70--75, Oct 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. R. Douceur. The sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pages 251--260, London, UK, UK, 2002. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. KS and G. Aghila. Article: A survey on black hole attacks on aodv protocol in manet. International Journal of Computer Applications, 34(5):23--30, November 2011. Full text available.Google ScholarGoogle Scholar
  7. R. Maulik and N. Chaki. A comprehensive review on wormhole attacks in manet. In 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), pages 233--238, Oct 2010.Google ScholarGoogle ScholarCross RefCross Ref
  8. R. Maulik and N. Chaki. A study on wormhole attacks in manet. International Journal of Computer Information Systems and Industrial Management Applications, IJCISIM, 2011.Google ScholarGoogle Scholar
  9. A. Nadeem and M. Howarth. Adaptive intrusion detection & prevention of denial of service attacks in manets. In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC '09, pages 926--930, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Papadimitratos and Z. J. Haas. Securing the internet routing infrastructure. IEEE Communications Magazine, 40(10):60--68, Oct 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. A. PequeÃśo, J. R. Rivera, and S. A. Kassler. Extension to mac 802.11 for performance improvement in manet. Master's thesis, Karlstads University, Sweden, 2006.Google ScholarGoogle Scholar
  12. M. Pirretti, S. Zhu, V. Narayanan, P. Mcdaniel, M. K, and R. Brooks. The sleep deprivation attack in sensor networks: Analysis and methods of defense. International Journal of Distributed Sensor Networks, 2(3):267--287, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  1. Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
        March 2016
        843 pages
        ISBN:9781450339629
        DOI:10.1145/2905055

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 March 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate97of270submissions,36%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader