Black Hole Attack Prevention in Wireless Peer-to-Peer Networks: A New Strategy

Mobile peer-to-peer networking (MP2P) is a relatively new paradigm compared to other wireless network technologies. In the last 10–15 years, it has gained tremendous popularity because of its usefulness in applications such as file sharing over the Internet in a decentralized manner. Security of mobile P2P networks represents an open research topic and a main challenge regarding the vulnerability of these networks and their convenience to different security attacks such as black hole, Sybil, etc. In this work, we analyze the black hole attack in wireless P2P networks using the AODV as the routing protocol. In a black hole attack, a malicious node assumes the identity of a legitimate node, by creating forged answers with a higher sequence number, and thus forces the victim node to prioritize it as a relay node. We propose a solution based on a modification of the AODV routing protocol, taking into account the behavior of each node participating in the network. The performances of our proposal are evaluated by simulation.

[1]  Peng Ning,et al.  How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[2]  Wenke Lee,et al.  Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.

[3]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[4]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[5]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[6]  Mohamed Ali Ayachi Contributions à la détection des comportements malhonnêtes dans les réseaux ad hoc AODV par analyse de la confiance implicite , 2011 .

[7]  Maha Abdelhaq,et al.  Security Routing Mechanism for Black Hole Attack over AODV MANET Routing Protocol , 2011 .

[8]  Lalit Himral,et al.  Preventing AODV Routing Protocol from Black Hole Attack , 2011 .

[9]  Raddad Al King Localisation de sources de données et optimisation de requêtes réparties en environnement pair-à-pair , 2010 .

[10]  Jean-Marc Robert,et al.  SU-OLSR : a new solution to thwart attacks against the OLSR protocol , 2009 .

[11]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[12]  Rakesh Kumar,et al.  Prevention of Black Hole Attacks in MANETs , 2018 .

[13]  Yacine Challal,et al.  Sécurité de l'Internet des Objets : vers une approche cognitive et systémique. (Internet of Things Security: towards cognitive and systemic approach) , 2012 .

[14]  Abelmajid Hajami Sécurité du routage dans les réseaux sans fil spontanés : Cas du protocole OLSR , 2011 .

[15]  Daniele Raffo,et al.  Security Schemes for the OLSR Protocol for Ad Hoc Networks. (Schémas de sécurité pour le protocole OLSR pour les réseaux ad hoc) , 2005 .