Conference Paper

Cooperative black and gray hole attacks in mobile ad hoc networks.

DOI: 10.1145/1352793.1352859 Conference: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2008, Suwon, Korea, January 31 - February 01, 2008
Source: DBLP

ABSTRACT In this paper, we propose a complete protocol to detect a chain of cooperating malicious nodes in an ad hoc network that disrupts transmission of data by feeding wrong routing information. Our technique is based on sending data in equal but small sized blocks instead of sending whole of data in one continuous stream. The flow of traffic is monitored independently at the neighborhoods of both source and destination. The results of monitoring are gathered by a backbone network of trusted nodes. With assumption that a neighborhood of any node in the ad hoc network has more trusted nodes than malicious nodes, our protocol can not only detect but also remove a chain of cooperating malicious nodes (gray/black hole) by ensuring an end-to-end checking between the transmission of two blocks of data. The protocol takes O(mdBN) time for detection and removal of gray/black holes chain which betters an earlier O(n2) time bound [4] for detecting a single black hole in the network. Here, m is the number of malicious nodes in the network, dBN is the diameter of a backbone network formed out of the flat ad hoc network, and n is the total number of nodes in the ad hoc network.

0 Bookmarks
 · 
176 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: In multi-hop wireless ad hoc networks, the packets are forwarded through intermediate nodes along the source–destination path. Without having any control on packets forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. The dropper motivation is the preservation of its resources, like its limited energy (selfish behavior) or the launch of denial of service attack (malicious behavior). In this paper, we propose an approach to verify the correct forwarding of packets by an intermediate node. The Merkle tree principle has been used for implementation in justification of our proposed approach. Through simulation, we have shown our approach efficiency, and we have evaluated its performance in both proactive and reactive routing protocol in ad hoc network. Also, we have compared our approach with the watchdog and the 2-hop ACK which are well-known approaches in the literature.
    Journal of Network and Computer Applications 05/2012; 35(3):1130–1139. · 1.77 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Mobile Ad-Hoc Networks (MANETs) are characterized by the lack of infrastructure, dynamic topology, and their use of the open wireless medium. Black-hole attack represents a major threat for such type of networks. The purpose of this paper is two folds. First, to present an extensive survey of the known black-hole detection and prevention approaches. Another objective is to present new dimensions for their classification.
    IEEE 13th International Conference on Computer and Information Technology, Sydney, Australia; 12/2013
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the existing solutions and discuss the state-of-the-art routing methods. We not only classify these proposals into single black hole attack and collaborative black hole attack but also analyze the categories of these solutions and provide a comparison table. We expect to furnish more researchers with a detailed work in anticipation.
    Human-centric Computing and Information Sciences. 1(1).

Full-text (2 Sources)

Download
127 Downloads
Available from
May 31, 2014