Skip to main content

2016 | OriginalPaper | Buchkapitel

Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network

verfasst von : Geetanjali Rathee, Hemraj Saini

Erschienen in: Proceedings of the International Congress on Information and Communication Technology

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain. Black hole and gray hole are the two major attacks at the network layer in WMN. RAODV, IDSAODV, and RIDAODV are some security approaches against these attacks. These approaches can immune the communication at a certain rate. We have proposed a cache-based secure AODV routing protocol, i.e., SDAODV in which instead of using the RREQ messages, security is provided by using the last sequence number of each packet. Using this approach, we have improved the network throughput at a certain rate. The performance of the proposed approach is evaluated by showing the throughput graph.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, Ian F., and Xudong Wang: A survey on wireless mesh networks. In: Communications Magazine, IEEE 43(9) (2005). Akyildiz, Ian F., and Xudong Wang: A survey on wireless mesh networks. In: Communications Magazine, IEEE 43(9) (2005).
2.
Zurück zum Zitat Redwan, Hassen, and Ki-Hyung Kim: Survey of security requirements, attacks and network integration in wireless mesh networks. In: IEEE conference on New Technologies, Mobility and Security, NTMS (2008). Redwan, Hassen, and Ki-Hyung Kim: Survey of security requirements, attacks and network integration in wireless mesh networks. In: IEEE conference on New Technologies, Mobility and Security, NTMS (2008).
3.
Zurück zum Zitat Zhang, Yanchao, and Yuguang Fang: ARSA: an attack-resilient security architecture for multihop wireless mesh networks. In: IEEE Journal on Selected Areas in Communications, 24(10) (2006). Zhang, Yanchao, and Yuguang Fang: ARSA: an attack-resilient security architecture for multihop wireless mesh networks. In: IEEE Journal on Selected Areas in Communications, 24(10) (2006).
4.
Zurück zum Zitat Baradeli, Nagaraj B., and Mr SP Srikanth: Architecture to Achieving Security in WMN (2004). Baradeli, Nagaraj B., and Mr SP Srikanth: Architecture to Achieving Security in WMN (2004).
5.
Zurück zum Zitat Cai, Jiwen, et al.: An adaptive approach to detecting black and gray hole attacks in ad hoc network. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), (2010). Cai, Jiwen, et al.: An adaptive approach to detecting black and gray hole attacks in ad hoc network. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), (2010).
6.
Zurück zum Zitat C. Karlof, D. Wagner.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Elsevier’s Ad Hoc J., vol 2(3), pp. 293–315 Sept (2003). C. Karlof, D. Wagner.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Elsevier’s Ad Hoc J., vol 2(3), pp. 293–315 Sept (2003).
7.
Zurück zum Zitat B Xiao, B. Yu, and C. Gao.: Chemas: identifying suspect nodes in selective forwarding attacks. In: Journal of Parallel Distributed Comput. Vol 67 pp. 1218–1230. B Xiao, B. Yu, and C. Gao.: Chemas: identifying suspect nodes in selective forwarding attacks. In: Journal of Parallel Distributed Comput. Vol 67 pp. 1218–1230.
8.
Zurück zum Zitat S. Marti, T. J. Giuli, K. Lai and M. Baker.: Mitigating Routing behaviour in mobile ad-hoc networks. In: Proc. International conference on mobile computing and networking, Boston, MA (2009). S. Marti, T. J. Giuli, K. Lai and M. Baker.: Mitigating Routing behaviour in mobile ad-hoc networks. In: Proc. International conference on mobile computing and networking, Boston, MA (2009).
9.
Zurück zum Zitat R. Curtmola and C. Nita-Rotaru.: BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks. In: Proc. Sensor, Mesh and Ad Hoc Communications and Networks, June (2007). R. Curtmola and C. Nita-Rotaru.: BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks. In: Proc. Sensor, Mesh and Ad Hoc Communications and Networks, June (2007).
10.
Zurück zum Zitat JiItsn Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu.: An adaptive approach to detecting black and Gray hole attacks in Adhoc networks. In: 24th IEEE International Conference on Advanced Information networking and application, pp. 775–891 (2010). JiItsn Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu.: An adaptive approach to detecting black and Gray hole attacks in Adhoc networks. In: 24th IEEE International Conference on Advanced Information networking and application, pp. 775–891 (2010).
11.
Zurück zum Zitat A. Patcha, A. Mishra.: Collaborative Security architecture of black hole attack prevention in mobile ad hoc networks [C]. In: Radio and Wireless Conference, pp. 75–78 (2003). A. Patcha, A. Mishra.: Collaborative Security architecture of black hole attack prevention in mobile ad hoc networks [C]. In: Radio and Wireless Conference, pp. 75–78 (2003).
12.
Zurück zum Zitat Hongmei Deng, Itsi Li, and Dharma P. Agrawal.: Routing Security in Wireless Ad Hoc Network. In: IEEE Communications Magazine, 40(10), pp. 70–75 October (2002). Hongmei Deng, Itsi Li, and Dharma P. Agrawal.: Routing Security in Wireless Ad Hoc Network. In: IEEE Communications Magazine, 40(10), pp. 70–75 October (2002).
13.
Zurück zum Zitat C. Kim, E. Talipov and B. Ahn.: A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. In: Proceeding from EUC’06: The 2006 International Conference on Emerging Directions in Embedded and Ubiquitous Computing, Seoul, 1(4), pp. 522–531 August (2006). C. Kim, E. Talipov and B. Ahn.: A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. In: Proceeding from EUC’06: The 2006 International Conference on Emerging Directions in Embedded and Ubiquitous Computing, Seoul, 1(4), pp. 522–531 August (2006).
14.
Zurück zum Zitat S. Dokurer, Y. M. Erten and E. A. Can.: Performance Analysis of Ad-Hoc Networks under Black Hole Attacks. In: Proceeding from SECON’07: IEEE Southeast Conference, Richmond, pp. 22–25 March (2007). S. Dokurer, Y. M. Erten and E. A. Can.: Performance Analysis of Ad-Hoc Networks under Black Hole Attacks. In: Proceeding from SECON’07: IEEE Southeast Conference, Richmond, pp. 22–25 March (2007).
15.
Zurück zum Zitat Shree, Om, and Francis J. Ogwu.: A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks.” (2013). Shree, Om, and Francis J. Ogwu.: A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks.” (2013).
Metadaten
Titel
Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network
verfasst von
Geetanjali Rathee
Hemraj Saini
Copyright-Jahr
2016
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0755-2_41

Neuer Inhalt