Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks

被引:14
|
作者
Zhao Min [1 ]
Zhou Jiliu [2 ]
机构
[1] Sichuan Univ, Sch Elect & Informat Engn, Chengdu 610064, Sichuan, Peoples R China
[2] McGill Univ, Elect & Comp Engn, Montreal, PQ H3A 2A7, Canada
来源
IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS | 2009年
关键词
Mobile ad hoc network (MANET); Black hole; Routing security; Hash function; Message authentication code (MAC); Pseudo random function;
D O I
10.1109/IEEC.2009.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The black hole attack is one of the security attacks that occur in mobile ad hoc networks (MANETs). In this article, the routing security issues and the problem of coordinated attack by multiple black holes acting in group in MANET are addressed in detail. Two authentication mechanisms, based on the hash function, the Message Authentication Code (MAC) and the Pseudo Random Function (PRF), are proposed to provide fast message verification and group identification, identify multiple black holes cooperating with each other and to discover the safe routing avoiding cooperative black hole attack.
引用
收藏
页码:26 / +
页数:3
相关论文
共 50 条
  • [31] A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks
    Khosa, Thabiso N.
    Mathonsi, Topside E.
    Du Plessis, Deon P.
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (03) : 532 - 542
  • [32] Effect of the black-hole attack in Vehicular Ad-Hoc Networks
    Mastouri, Mohamed Anis
    Hasnaoui, Salem
    2021 26TH IEEE ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS {APCC), 2021, : 205 - 210
  • [33] Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
    Su, Ming-Yang
    COMPUTER COMMUNICATIONS, 2011, 34 (01) : 107 - 117
  • [34] Detection of Black hole Attack in Mobile Ad hoc Network using Adaptive Approach
    Baghel, Lokesh
    Mishra, Prakash
    Samvatsar, Makrand
    Singh, Upendra
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 626 - 630
  • [35] Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network
    Arunmozhi, S. A.
    Venkataramani, Y.
    INFORMATION SECURITY JOURNAL, 2012, 21 (03): : 150 - 158
  • [36] Simulation study of multiple black holes attack on mobile ad hoc networks
    Ramaswamy, S
    Fu, HR
    Nygard, KE
    ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 595 - 602
  • [37] Black Hole Attack Prevention in Mobile Ad-hoc Network (MANET) Using Ant Colony Optimization Technique
    Khan, Dost Muhammad
    Aslam, Talal
    Akhtar, Nadeem
    Qadri, Salman
    Khan, Noman Ameer
    Rabbani, Imran Mujaddid
    Aslam, Muhammad
    INFORMATION TECHNOLOGY AND CONTROL, 2020, 49 (03): : 308 - 319
  • [38] Clone attack detection and data loss prevention in mobile ad hoc networks
    Mani, Ganapathy
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (01) : 9 - 22
  • [39] On the Prevention of Collusion Attack in OLSR-based Mobile Ad hoc Networks
    Babu, M. N. Kishore
    Franklin, A. Antony
    Murthy, C. Siva Ram
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 96 - 101
  • [40] Cooperative communications in mobile ad hoc networks
    Scaglione, Anna
    Goeckel, Dennis L.
    Laneman, J. Nicholas
    IEEE SIGNAL PROCESSING MAGAZINE, 2006, 23 (05) : 18 - 29