An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network

被引:30
|
作者
Cai, Jiwen [1 ]
Yi, Ping [1 ]
Chen, Jialin [1 ]
Wang, Zhiyang [1 ]
Liu, Ning [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200030, Peoples R China
关键词
Ad Hoc; Black Hole; Gray Hole; Cross Layer Design; DSR; Intrusion Detection;
D O I
10.1109/AINA.2010.143
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate.
引用
收藏
页码:775 / 780
页数:6
相关论文
共 50 条
  • [1] Developing a Hybrid Detection Approach to Mitigating Black Hole and Gray Hole Attacks in Mobile Ad Hoc Networks
    Yazdanypoor, Mohammad
    Cirillo, Stefano
    Solimando, Giandomenico
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (17):
  • [2] Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks
    Venu, Vasantha Sandhya
    Avula, Damodaram
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (06)
  • [3] Detection of Black hole Attack in Mobile Ad hoc Network using Adaptive Approach
    Baghel, Lokesh
    Mishra, Prakash
    Samvatsar, Makrand
    Singh, Upendra
    [J]. 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 626 - 630
  • [4] An Approach to detect Gray-hole Attacks on Mobile ad-hoc Networks
    Sachan, Kusumlata
    Lokhande, Manisha
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [5] An Approach to Prevent Gray-hole Attacks on Mobile ad-hoc Networks
    Sachan, Kusumlata
    Lokhande, Manisha
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [6] A Rank Sequence Method for Detecting Black Hole Attack in Ad hoc Network
    Xiong Kai
    Yin Mingyong
    Li Wenkang
    Jiang Hong
    [J]. PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTERNET OF THINGS, 2015, : 155 - 159
  • [7] Analysis of security methods in Vehicular Ad-Hoc Network against Worm Hole and Gray Hole attacks
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    [J]. 2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 371 - 378
  • [8] Security methods against Black Hole attacks in Vehicular Ad-Hoc Network
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    [J]. 2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2020,
  • [9] Game Theoretic Modeling of Gray Hole Attacks in Wireless Ad Hoc Networks
    Doshi, Chintan Ketankumar
    Sankaranarayanan, Sreecharan
    Lakshman, Vidyashankar B.
    Chandrasekaran, K.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 217 - 226
  • [10] A Novel Approach for Detecting and Eliminating Cooperative Black Hole Attack using Advanced DRI Table in Ad hoc Network
    Mishra, Ankur
    Jaiswal, Ranjeet
    Sharma, Sanjay
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 499 - 504