Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems

Inamobileadhocnetwork,asourcenodemustrelyonintermediatenodestoforwarditspackets alongmulti-hoproutestothedestinationnode.Theperformanceofamobileadhocnetworkisclosely relatedtothecapabilityoftheimplementedroutingprotocoltoadaptitselftounpredictablechanges oftopologynetworkandlinkstatus.Oneoftheseroutingprotocolsisoptimizedlinkstaterouting protocolwhichassumesthatallnodesaretrusted.However,inahostileenvironment,theOLSRis knowntobevulnerabletovariouskindsofmaliciousattacks.Withouthavinganycontrolonpacket forwarding,anintermediatenodecanbehaveselfishlyormaliciouslytodroppacketsgoingthrough it.Therefore, in thisarticle, theauthorsproposeanew technique for the selectionofmultipoint relayswhoseaimstoprovideeachnodetheabilitytoselectalternativepathsinordertoreachany destinationtwohopsaway. KeywoRDS Colluding Blackhole Attack, Cooperative Black Hole Attack, Mobile Ad Hoc Network, Optimised Link State Routing Protocol, Routing Protocol, Security, Sensor Networks, Single Black Hole Attack

[1]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[2]  Madasamy Kaliappan,et al.  Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model , 2015, Comput. Electr. Eng..

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  Issa M. Khalil,et al.  Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure , 2011, IEEE Transactions on Mobile Computing.

[5]  M. Wang,et al.  An effective intrusion detection approach for OLSR MANET protocol , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[6]  Yu Liu,et al.  A framework for intrusion detection systems by social network analysis methods in ad hoc networks , 2009, Secur. Commun. Networks.

[7]  Rafael Timóteo de Sousa Júnior,et al.  Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.

[8]  Rachid Latif,et al.  A novel security approach for struggling black hole attack in optimised link state routing protocol , 2015, Int. J. Sens. Networks.

[9]  Zhao Min,et al.  Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[10]  Chang-Wu Yu,et al.  A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks , 2007, PAKDD Workshops.

[11]  Soufiene Djahel,et al.  Avoiding virtual link attacks in wireless ad hoc networks , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[12]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[13]  Soufiene Djahel,et al.  Defending against packet dropping attack in vehicular ad hoc networks , 2008, Secur. Commun. Networks.

[14]  Abderrahmane Baadache,et al.  Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..

[15]  Madasamy Kaliappan,et al.  Development of a secure routing protocol using game theory model in mobile ad hoc networks , 2015, Journal of Communications and Networks.