Investigating Varying Time Black Hole Attack on QoS over MANET

Mobile Ad hoc Networks are vulnerable to various attacks due to its nature, as it is a multihop process between sender and receiver. One of these attacks is black hole attack, which will simply delete any packet instead of forwarding it. Sometimes these kinds of malicious nodes may behave as true node giving impression that it is not malicious, while rest of the time they are dropping all packets, so affecting the QoS. Discovering such kind of malicious nodes are very difficult as isolating them is not easy because their malicious behavior is in on and off fashion. In our paper, we had inspected such nodes which are behaving like a black hole for variable time intervals on different parameters. Further for deeper study, we have considered different number of such malicious nodes to give more insight on comparisons.

[1]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[2]  Yi Yang,et al.  Generic Threats to Routing Protocols , 2006, RFC.

[3]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[4]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[5]  Fei Xing,et al.  Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[6]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[7]  Farrukh Aslam Khan,et al.  Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Shiyong Zhang,et al.  Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[9]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[10]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[11]  S. Sharma,et al.  Detection of malicious attack in MANET a behavioral approach , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[12]  Scott Shenker,et al.  Integrated Services in the Internet Architecture : an Overview Status of this Memo , 1994 .

[13]  Winston Khoon Guan Seah,et al.  Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks , 2006, ICOIN.

[14]  R. B. Patel,et al.  Analysing varying rate flood attack on real flow in MANET and solution proposal 'real flow dynamic queue' , 2017 .

[15]  Ai-Fen Sui,et al.  An effective method to mitigate route query floods in MANETs , 2011, 2011 IEEE 13th International Conference on Communication Technology.

[16]  Christopher Metz,et al.  Differentiated Services , 2000, IEEE Multim..