Intercepting Blackhole Attacks in MANETs: An ASM-based Model

被引:1
|
作者
Bianchi, Alessandro [1 ]
Pizzutilo, Sebastiano [1 ]
Vessio, Gennaro [1 ]
机构
[1] Univ Bari, Dept Informat, Via Orabona 4, I-70125 Bari, Italy
关键词
Abstract State Machines; Mobile Ad-hoc NETworks Blackhole; ABSTRACT-STATE MACHINES;
D O I
10.1007/978-3-319-74781-1_10
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The inherent features of Mobile Ad-hoc NETworks (MANETs) make them vulnerable to various kinds of security attacks. In particular, in a so-called blackhole attack, one or more malicious hosts can send fake routing information towards an initiator, compromising the reliability of the network in the whole. In this paper, we propose a refinement of the NACK-based Ad-hoc On-demand Distance Vector (N-AODV) protocol, namely Blackhole-free N-AODV (BN-AODV), as a solution to intercept (cooperative) blackhole attacks in MANETs. Thanks to a formalization through an Abstract State Machine-based model, the correctness of the proposed protocol is formally proved.
引用
收藏
页码:137 / 152
页数:16
相关论文
共 50 条
  • [1] Resisting Blackhole Attacks on MANETs
    Abdelshafy, Mohamed A.
    King, Peter J. B.
    [J]. 2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [2] An ASM-based Formal Model of a Java Program
    A. Zamulin
    [J]. Programming and Computer Software, 2003, 29 : 130 - 139
  • [3] A cluster-based countermeasure against blackhole attacks in MANETs
    Shi, Fei
    Liu, Weijie
    Jin, Dongxu
    Song, Jooseok
    [J]. TELECOMMUNICATION SYSTEMS, 2014, 57 (02) : 119 - 136
  • [4] A cluster-based countermeasure against blackhole attacks in MANETs
    Fei Shi
    Weijie Liu
    Dongxu Jin
    Jooseok Song
    [J]. Telecommunication Systems, 2014, 57 : 119 - 136
  • [5] An ASM-based Model for Grid Job Management
    Bianchi, Alessandro
    Manelli, Luciano
    Pizzutilo, Sebastiano
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2013, 37 (03): : 295 - 306
  • [6] An ASM-based formal model of a Java']Java program
    Zamulin, A
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2003, 29 (03) : 130 - 139
  • [7] An Effective Initialization for ASM-Based Methods
    Hua, Hong-Quan
    Le, T. Hoang Ngan
    Le, Bac
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2014, 2014, 8838 : 421 - 432
  • [8] MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs
    Jhaveri, Rutvij H.
    [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES (ACCT 2013), 2013, : 254 - 260
  • [9] ASM-based Formal Model for Analysing Cloud Auto-Scaling Mechanisms
    Gavua E.K.
    Kecskemeti G.
    [J]. Informatica (Slovenia), 2023, 47 (06): : 75 - 96
  • [10] PSEUDOEXHAUSTIVELY TESTABLE ASM-BASED DESIGNS OF DIGITAL-SYSTEMS
    GREEN, DH
    CHUGHTAI, MA
    [J]. IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1987, 134 (05): : 237 - 242