A secure model for prevention of black hole attack in wireless mobile ad hoc networks

Implementing Ad hoc networks are becoming very prevalent during recent years. Security is the most important issue for developing mobile ad hoc networks (MANETs). They expose to various kinds of attacks because of their unique nature in which every node can easily join to network or leave it. Black hole attack is the most probable attack in MANET. In this research we proposed a model for prevention of this attack. It judges on route replies coming from the intermediate node based on a trusted third party which is the destination node. If the source node received an acknowledgement on the route replies sending by an intermediate node, from destination during a specific time, it decides that the path is safe and intermediate node is not malicious. Meanwhile a counter will be set for counting the number of times that each intermediate node introduced a wrong route reply. Every node that proposes a wrong route reply will be recorded in a black list. The process also will be checked for all one hop neighbors of the suspicious node and the history of these nodes will be gathered in the black list, if they proposed a wrong route reply during the route discovery process. When the counter for each node exceed from a specific value, the chain of suspicious nodes will be introduced as black holes and an alarm will be notified to all nodes in the network to remove these malicious nodes from their routing tables.

[1]  Mazdak Zamani,et al.  A confidential RFID model to prevent unauthorized access , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).

[2]  E. A. Mary Anita,et al.  Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining , 2010 .

[3]  Kun-Ming Yu,et al.  A Distributed and Cooperative Algorithm for the Detection and Elimination of Multiple Black Hole Nodes in Ad Hoc Networks , 2009, IEICE Trans. Commun..

[4]  Mazdak Zamani,et al.  Redirecting outgoing DNS requests toward a fake DNS server in a LAN , 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences.

[5]  Zhao Min,et al.  Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[6]  Honarbakhsh Shohreh,et al.  Dynamic Monitoring in Ad Hoc Network , 2012 .

[7]  Mazdak Zamani,et al.  A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[8]  Seyed Mostafa Mirhosseini,et al.  A Survey on Methods to Defend against DDoS Attack in Cloud Computing , 2013 .

[9]  Mazdak Zamani,et al.  A trust based model for federated identity architecture to mitigate identity theft , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[10]  Hossein Rouhani Zeidanloo,et al.  A proposed framework for P2P botnet detection , 2010 .

[11]  Hossein Rouhani Zeidanloo,et al.  A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[12]  Mazdak Zamani,et al.  Improving the security of protected wireless internet access from insider attacks , 2012 .

[13]  Mojtaba Alizadeh,et al.  A Survey on Attacks in RFID Networks , 2012 .

[14]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[15]  Hossein Rouhani Zeidanloo,et al.  Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.

[16]  M. Zamani,et al.  An Overview on Methods to Detect Port Scanning Attacks in Cloud Computing , 2013 .

[17]  M. Janbeglou,et al.  Redirecting network traffic toward a fake DNS server on a LAN , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[18]  Mojtaba Alizadeh,et al.  Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .

[19]  Mazdak Zamani,et al.  A survey on security issues of federated identity in the cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[20]  M. Zamani,et al.  Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance , 2012, 2012 IEEE Conference on Open Systems.

[21]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[22]  Mazdak Zamani,et al.  Development of a Web-Based Community Management Information System , 2011, 2011 Fourth International Conference on Information and Computing.