Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks

Blackhole attack is one of the severe attacks in MANET routing protocols. Generation of this attack is simple, which does not require specific tools or sophisticated attack techniques. However, this attack seriously corrupts the routing tables of nodes in the network. Even worse, the attack could increase the chances of losing confidential data and deny network services. Many researchers have proposed a variety of solutions to prevent this Conventional Blackhole Attack (CBA). Unfortunately, none of them has measured the severity of this attack. Filling gaps in measuring the severity of this attack, this research proposes a new security metrics, namely Corruption Routing Table (CRT), Compromising Relay Node (CRN) and Compromising Originator Node (CON). In addition, this research also introduces a new blackhole attack, namely Hybrid Black Hole Attack (HBHA) with two variants — Independent and Cooperative HBHAs. The proposed metrics proved effective in measuring the severity of both CBA and HBHAs. Simulation using Java in Time Simulator/Scalable Wireless Adhoc Network Simulator (JiST/SWANS) showed that Independent HBHA is the most severe attack compared to Cooperative HBHA and CBA. In addition, Cooperative HBHA is the most efficient attack than Independent HBHA and CBA.

[1]  Xiaodong Lin,et al.  A clique-based secure admission control scheme for mobile ad hoc networks (MANETs) , 2011, J. Netw. Comput. Appl..

[2]  Udo W. Pooch,et al.  Detecting black-hole attack in mobile ad hoc networks , 2003 .

[3]  Dhinaharan Nagamalai,et al.  Recent Trends in Wireless and Mobile Networks , 2011 .

[4]  Robbert van Renesse,et al.  JiST: an efficient approach to simulation using virtual machines , 2005, Softw. Pract. Exp..

[5]  Michele Garetto,et al.  Analysis of Random Mobility Models with Partial Differential Equations , 2007, IEEE Transactions on Mobile Computing.

[6]  Adrian Perrig,et al.  Proceedings of the 2nd ACM workshop on Wireless security , 2003 .

[7]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[8]  Robbert van Renesse,et al.  JiST: an efficient approach to simulation using virtual machines: Research Articles , 2005 .

[9]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[10]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[11]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[12]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[13]  Kwok-Yan Lam,et al.  SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.

[14]  Younghwan Yoo,et al.  Why does it pay to be selfish in a MANET? , 2006, IEEE Wireless Communications.

[15]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[16]  Peter Druschel,et al.  Peer-to-peer systems , 2010, Commun. ACM.

[17]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[18]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[19]  Abdul Hanan Abdullah,et al.  A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol , 2010, WiMo.

[20]  J. J. Garcia-Luna-Aceves,et al.  Non-interactive key establishment in mobile ad hoc networks , 2007, Ad Hoc Networks.

[21]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[22]  Jane Zhen,et al.  Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.

[23]  S.S. Ramaswami,et al.  Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing , 2006, 2006 IEEE Information Assurance Workshop.

[24]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[25]  Yanheng Liu,et al.  Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..

[26]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).