Collaborative security architecture for black hole attack prevention in mobile ad hoc networks

An ad hoc network is a group of wireless mobile computers (or nodes) wherein individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. The Black hole attack is an important problem that could happen easily in ad hoc networks especially in popular on-demand protocols like the ad hoc on-demand distance vector routing (AODV). Prior research in ad hoc networking has generally looked into the routing problem in a non-adversarial network setting, assuming a reasonably trusted environment. This paper proposes a collaborative architecture to detect and exclude malicious nodes that act in groups or alone. The focus is on the network layer, using the ad hoc on-demand distance vector routing (AODV) protocol as an example. This paper describes an extension to the watchdog method to incorporate a collaborative architecture to tackle collusion among nodes.

[1]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[2]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[3]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[4]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[5]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[6]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[7]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[8]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[9]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.