Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network

被引:6
|
作者
Arunmozhi, S. A. [1 ]
Venkataramani, Y. [1 ]
机构
[1] Saranathan Coll Engn, Tiruchirappalli, Tamil Nadu, India
来源
INFORMATION SECURITY JOURNAL | 2012年 / 21卷 / 03期
关键词
mobile ad-hoc network; network security; routing protocol; black hole attack; defense scheme;
D O I
10.1080/19393555.2011.652291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is an essential service for mobile network communications. Routing plays an important role in the security of mobile ad-hoc networks (MANETs). A wide variety of attacks targets the weakness of MANETs. By attacking the routing protocols, attackers can absorb network traffic, injecting themselves into the path between the source and destination. The black hole attack is one of the routing attacks where a malicious node advertise itself as having the shortest path to all nodes in the network by sending fake route reply. In this paper, a defense scheme for detecting black hole node is proposed. The detection is based on the timing information and destination sequence numbers maintained in the Neighborhood Route Monitoring Table. The table maintains the record of time of Reply. A black hole node will send a route reply message without checking the routing table as the legitimate node normally does. This reduced reply time is used to detect the black hole node. To improve the security further, the destination sequence number is checked with the threshold value, which is dynamically updated. The simulation results demonstrate that the protocol not only detects black hole attack but also improves the overall performance.
引用
收藏
页码:150 / 158
页数:9
相关论文
共 50 条
  • [1] An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network
    Deepa
    Agarkhed, Jayashree
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 313 - 323
  • [2] Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks
    Dhama, Siddharth
    Sharma, Sandeep
    Saini, Mukul
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2993 - 2996
  • [3] A Novel Taxonomy of Black-hole Attack Detection Techniques in Mobile Ad-Hoc Network (MANET)
    Sherif, Ahmed
    Elsabrouty, Maha
    Shoukry, Amin
    [J]. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 346 - 352
  • [4] Modified AODV Protocol to Prevent Black Hole Attack in Mobile Ad-hoc Network
    Sharma, Romina
    Shrivastava, Rajesh
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (03): : 121 - 124
  • [5] Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks
    Banerjee, Sukla
    [J]. WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 337 - 342
  • [6] A Survey over Black hole Attack Detection in Mobile Ad hoc Network
    Behzad, Shahram
    Jamali, Shahram
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (03): : 44 - 51
  • [7] An Analytical Approach for Detection of Gray Hole Attack in Mobile Ad-hoc Network (MANET)
    Shukla, Parineet D.
    Kanthe, Ashok M.
    Simunic, Dina
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 78 - 82
  • [8] Solution to the black hole problem in mobile Ad-Hoc network
    Makki, S
    Pissinou, N
    Huang, H
    [J]. 5th World Wireless Congress, Proceedings, 2004, : 508 - 512
  • [9] Detection of Black hole Attack in Mobile Ad hoc Network using Adaptive Approach
    Baghel, Lokesh
    Mishra, Prakash
    Samvatsar, Makrand
    Singh, Upendra
    [J]. 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 626 - 630
  • [10] Black Hole Attack's Effect Mobile Ad-hoc Networks (MANET)
    Sardana, Anjali
    Saini, Akanksha
    Bedwal, Tushina
    Tayal, Radhika
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 966 - 970