A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks

An ad hoc network is a collection of infrastructure less nodes, cooperating dynamically to form a temporary network which meets certain immediate needs. The lack of in frastructure implies that the nodes are connected peer-to-peer. Therefore, each node acts as a router beside its main role as a hos t. With the increased number of mobile devices, the application s of ad hoc network increased dramatically to capture different domains such as: academic communication, and mobile conferencing beside its traditional domains such as: military communication , and emergency communication. Security issues become more challenging in ad hoc n etwork due to its dynamic nature which allows any node to freely join as well as leave the network without having a physical address or getting permission. Ad hoc networks are vulnerable to diffe rent kinds of attacks such as: denial of services, impersonation, and eavesdropping. This paper discusses one of the security problems i n ad hoc networks called the black hole problem. It occurs w hen a malicious node referred as black hole joins the network. The black hole conducts its malicious behavior during the process of route discovery. For any received RREQ, the black hole cl aims having a route and propagates a faked RREP. The source node responds to these faked RREPs and sends its data through the re ceived routes. Once the data is received by the black hole, it is dropped instead of being sent to the desired destination. The proposed protocol is built on top of the origin al AODV. It extends the AODV to include the following functionalities: source node waits for a reliable route; each node has a ta ble in which it adds the addresses of the reliable nodes; RREP is o verloaded with an extra field to indicate the reliability of the r eplying node. The simulation of the proposed protocol shows significa nt improvement in the terms of: packet delivery ratio, number of d ropped packets, and end-to-end delay. The overhead still needs more researches .

[1]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[2]  Jon Crowcroft,et al.  Proceedings of the conference on Communications architectures, protocols and applications , 1994, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.

[3]  Leonidas Georgiadis,et al.  A Distributed Algorithm for Maximum Lifetime Routing in Sensor Networks with Mobile Sink , 2006, IEEE Transactions on Wireless Communications.

[4]  J. J. Garcia-Luna-Aceves,et al.  An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..

[5]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[6]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[7]  Thomas G. Zimmerman,et al.  : Near-field , 2022 .

[8]  D. Kusumalatha,et al.  Security Issues in Wireless Ad-Hoc Network Routing Protocols , 2013 .

[9]  Dharma P. Agrawal,et al.  Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.

[10]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[11]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[12]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[13]  Ahmed Sameh,et al.  Reputed Authenticated Routing Ad-Hoc Networks Protocol , 2009 .

[14]  Charles E. Perkins,et al.  Ad hoc networking: an introduction , 2001 .

[15]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[16]  M. Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).

[17]  Ali Ghaffari,et al.  Vulnerability and security of mobile ad hoc networks , 2006 .

[18]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[19]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[20]  Muneer O. Bani Yassein,et al.  Neighborhood-Based Route Discovery Protocols for Mobile Ad Hoc Networks , 2013, Int. J. Mob. Comput. Multim. Commun..

[21]  Ahmed Sameh,et al.  Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN) , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[22]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[23]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[24]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..