A Novel Collaborative Approach for Sinkhole Detection in MANETs

This paper presents a novel approach intended to detect sinkholes in MANETs running AODV. The study focuses on the detection of the well-known sinkhole attack, devoted to attract most of the surrounding network traffic by providing fake routes, and thus, invalidating alternative legitimate routes and disrupting the normal network operation. Our detection approach relies on the existence of “contamination borders”, formed by legitimate nodes under the influence of the sinkhole attack and, at the same time, neighbors of non-contaminated legitimate nodes. Thus, by collecting the routing information of the neighbors, these nodes are likely to be able to properly detect sinkholes. We evaluate our approach in a simulation framework and the experimental results show the promising nature of this approach in terms of detection capabilities.

[1]  Gabriel Maciá-Fernández,et al.  Taxonomy and Holistic Detection of Security Attacks in MANETs , 2014 .

[2]  J. Jordan,et al.  Channel holding time distribution in cellular telephony , 1998 .

[3]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[4]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[5]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[6]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[7]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[8]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[9]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[10]  Gabriel Maciá-Fernández,et al.  NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study , 2013 .

[11]  Kamaljit I. Lakhtaria Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends , 2012 .

[12]  Aboul Ella Hassanien,et al.  Advances in Security of Information and Communication Networks , 2013, Communications in Computer and Information Science.

[13]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[14]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[15]  Yibeltal Fantahun Alem,et al.  Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection , 2010, 2010 2nd International Conference on Future Computer and Communication.

[16]  Lalit Himral,et al.  Preventing AODV Routing Protocol from Black Hole Attack , 2011 .

[17]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.