A neighborhood connectivity-based trust scheme to identify active black hole attacks

Active black hole attack is one of the most severe security threats that can be easily employed against normal routing in mobile ad hoc networks. In order to intrude into routing path, attacker always deceiving others that it has the shortest path to the destination. Once the attacker successfully intrudes into routing path, it can disrupt all data transmission. Most of the existing defense schemes are not effective for the internal attackers that know how the scheme works. In this paper, we propose a neighborhood connectivity based trust scheme that can detect the presence of the attackers during route discovery and quarantine them. The most attractive features of our scheme are 1) Its ability to against two forms of active black hole (active forward and active drop) attacks without relying on any extra hardware or computational intensive cryptographic mechanism. 2) Even the internal attackers that know the scheme or imitating others' identities cannot benefit them to launch the attacks. 3) Colluded active black hole attackers can also be identified.

[1]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[2]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[3]  Djamel Djenouri,et al.  Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .

[4]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[5]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[6]  Isaac Woungang,et al.  Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks , 2012, FPS.

[7]  William Kozma,et al.  REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits , 2009, WiSec '09.

[8]  Daniel R. Simon,et al.  Secure traceroute to detect faulty or malicious routing , 2003, CCRV.

[9]  K. J. Ray Liu,et al.  HADOF: defense against routing disruptions in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[10]  Ning Liu,et al.  The Simulation and Comparison of Routing Attacks on DSR Protocol , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[12]  Ming Gu,et al.  Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.