Black Hole Attack in Manets: Defending and Detecting Techniques

Black Hole Attack in Manets: Defending and Detecting Techniques

Security in the Mobile Adhoc Network is a very crucial issue that requires continuous attention for the betterment of communication and safe delivery of the data. Several researchers proposed different security mechanisms to prevent a network from breaches but still, there is a lack of security and is vulnerable to different attacks like blackhole attack, Gray-hole, DoS and many more. Blackhole redirects the traffic towards the intruder node which is not a real node and not even the part of the network like, blackhole in the universe. It creates a fake path for the source node to reach the destination node and attracts all the packets towards itself and then drop all the packets. This paper describes the blackhole attacks in mobile adhoc network in detail along with its variants. The other existing techniques for detection and prevention from blackhole attacks are also discussed and their performance is analyzed based on different security measures.

___

  • Chang, J., Tsou, P., Woungang, I., Chao, H., & Lai, C. (2015). Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach. IEEE Systems Journal, 9(1), 65-75.
  • Marchang, N., & Datta, R. (2012). Light-weight trust- based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77.
  • Pham, T. N., & Yeo, C. K. (2016). Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks. IEEE Transactions on Mobile Computing, 15(5), 1116-1129.
  • Umar, I. A., Hanapi, Z. M., Sali, A., &Zulkarnain, Z. A. (2017). TruFiX: A Configurable Trust-Based Cross- Layer Protocol for Wireless Sensor Networks. IEEE Access, 5, 2550-2562.
  • Babu, M. R., Dian, S. M., Chelladurai, S., &Palaniappan, M. (2015). Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version. The Scientific World Journal, 2015, 1-11.
  • Su, M. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34(1), 107-117.
  • Kumar, S., & Dutta, K. (2015). Intrusion detection technique for black hole attack in mobile ad hoc networks. International Journal of Information Privacy, Security and Integrity, 2(2), 81.
  • Djenouri, D., Bouamama, M., &Mahmoudi, O. (2009). Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks. International Journal of Security and Networks,4(4), 246.
  • Francois, J., Aib, I., &Boutaba, R. (2012). FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks. IEEE/ACM Transactions on Networking, 20(6), 1828-1841.
  • Weerasinghe, H., & Fu, H. (2007). Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. Future Generation Communication and Networking (FGCN 2007), 2.
  • Ramaswamy, Sanjay & Fu, Huirong&Sreekantaradhya, Manohar & Dixon, John & Nygard, Kendall. (2003). Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks.. 570-575.
  • Su, M., Chiang, K., & Liao, W. (2010). Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks. International Symposium on Parallel and Distributed Processing with Applications.
  • Gupta, S., Kar, S., & Dharmaraja, S. (2011). BAAP: Blackhole attack avoidance protocol for wireless network. 2011 2nd International Conference on Computer and Communication Technology (ICCCT- 2011).
  • Jhaveri, R. H., Patel, S. J., &Jinwala, D. C. (2012). A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks. 2012 Second International Conference on Advanced Computing & Communication Technologies.
  • Chatterjee, N., & Mandal, J. K. (2013). Detection of Blackhole Behaviour Using Triangular Encryption in NS2. Procedia Technology, 10, 524-529.
  • Tan, S., & Kim, K. (2013). Secure Route Discovery for Preventing Black Hole Attacks on AODV-Based MANETs. 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
  • Thachil, F., &Shet, K. (2012). A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET. 2012 International Conference on Computing Sciences.
  • Zhang, X., Sekiya, Y., &Wakahara, Y. (2009). Proposal of a method to detect black hole attack in MANET. 2009 International Symposium on Autonomous Decentralized Systems, 1-7.
  • Sarkar, P., &Chaki, R. (2012). A Cryptographic Approach towards Black Hole Attack Detection. Advances in Computing and Information Technology Advances in Intelligent Systems and Computing, 273-278.
  • Hazra, S., &Setua, S. K. (2014). Blackhole Attack Defending Trusted On-Demand Routing in Ad-Hoc Network. Advanced Computing, Networking and Informatics- Volume 2 Smart Innovation, Systems and Technologies, 59-66.
  • Kim, Y., & Kim, D. (2013). IDS Scheme for Blackhole Attack on MANETs. Lecture Notes in Electrical Engineering Future Information Communication Technology and Applications, 863-870.
  • Banerjee, S., Sardar, M., & Majumder, K. (2014). AODV Based Black-Hole Attack Mitigation in MANET. Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 Advances in Intelligent Systems and Computing, 345-352.
  • Ahmad, S. J., Reddy, V. S., Damodaram, A., & Krishna, P. R. (2015). Detection of Black Hole Attack Using Code Division Security Method. Advances in Intelligent Systems and Computing Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, 307-314.
  • Rana, A., Rana, V., & Gupta, S. (2015). EMAODV: Technique to Prevent Collaborative Attacks in MANETs. Procedia Computer Science, 70, 137-145.
  • Kumar, V., & Kumar, R. (2015). An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network. Procedia Computer Science, 48, 472-479.
  • Dhaka, A., Nandal, A., & Dhaka, R. S. (2015). Gray and Black Hole Attack Identification Using Control Packets in MANETs. Procedia Computer Science, 54, 83-91.
  • Subba, B., Biswas, S., &Karmakar, S. (2016). Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation. Engineering Science and Technology, an International Journal, 19(2), 782-799.
  • Kumar, K. V., & Somasundaram, K. (2016). An Effective CBHDAP Protocol for Black Hole Attack Detection in Manet. Indian Journal of Science and Technology, 9(36).