A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less working and vulnerability of underlined standard routing protocols is exposed to various packet drop attacks such as blackhole attack, grayhole attack and co-operative blackhole attack. These attacking nodes participate actively in the route establishment process and when a path is established between two end nodes through these nodes, these nodes drop the data packets according to a pattern related to the type of attack. So, security of the network communication is a very critical issue and must be handled with greater efficiency and effectiveness. A lot of research has been carried out to detect and mitigate the effects of blackhole attack and its variants in MANET. In this paper, Different variants of blackhole attack are discussed along with shortcomings of present literature. We present a comprehensive taxonomy of the mitigation and detection mechanism along with summarization and comparison of some published work related to those categories. There are in total sixteen different categories of mitigation mechanism and we have reviewed and summarized ninety one research works related to the presented categories on various parameters like overhead, base protocol, modification in base routing protocol, detection type, nature, features and limitations.

[1]  Syed Jalal Ahmad,et al.  Detection of Black Hole Attack Using Code Division Security Method , 2015 .

[2]  K. Selvamani,et al.  Reputed Packet Delivery Using Efficient Audit Misbehaviour Detection and Monitoring Method in Mobile Ad Hoc Networks , 2015 .

[3]  E. A. Mary Anita,et al.  Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure , 2009, Inf. Secur. J. A Glob. Perspect..

[4]  Ravinder Singh,et al.  Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET , 2017, Cluster Computing.

[5]  Sushanta Karmakar,et al.  Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation , 2016 .

[6]  Abdul Hanan Abdullah,et al.  A review of blackhole attack in mobile adhoc network , 2013, 2013 3rd International Conference on Instrumentation, Communications, Information Technology and Biomedical Engineering (ICICI-BME).

[7]  Hesham A. Ali,et al.  A recommender system for team formation in MANET , 2015, J. King Saud Univ. Comput. Inf. Sci..

[8]  Paz Morillo,et al.  Cryptographic techniques for mobile ad-hoc networks , 2007, Comput. Networks.

[9]  Xiangjian He,et al.  A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.

[10]  Neeraj Suri,et al.  P2P routing table poisoning: A quorum-based sanitizing approach , 2017, Comput. Secur..

[11]  Vani A. Hiremani,et al.  Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).

[12]  Rutvij H. Jhaveri,et al.  A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.

[13]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[14]  Keyvan RahimiZadeh,et al.  Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks , 2014, Secur. Commun. Networks.

[15]  M. Poongodi,et al.  Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem , 2015 .

[16]  Raja Datta,et al.  Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.

[17]  Zhen Ma,et al.  A Distributed and Adaptive Trust Evaluation Algorithm for MANET , 2016, Q2SWinet@MSWiM.

[18]  Weijie Liu,et al.  A cluster-based countermeasure against blackhole attacks in MANETs , 2014, Telecommun. Syst..

[19]  Muhammad Imran,et al.  A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks , 2017, Future Gener. Comput. Syst..

[20]  Isaac Woungang,et al.  Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.

[21]  Shashi Gurung,et al.  A dynamic threshold based approach for mitigating black-hole attack in MANET , 2018, Wirel. Networks.

[22]  Djamel Djenouri,et al.  On eliminating packet droppers in MANET: A modular solution , 2009, Ad Hoc Networks.

[23]  Edwin Hsing-Mean Sha,et al.  Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks , 2016, J. Netw. Comput. Appl..

[24]  Jacob C. N. Schuldt,et al.  On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks , 2015, ICISC.

[25]  Shashi Gurung,et al.  A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[26]  Shukor Abd Razak,et al.  Trust-Based Routing Mechanism in MANET: Design and Implementation , 2013, Mob. Networks Appl..

[27]  Arvind Dhaka,et al.  Gray and Black Hole Attack Identification Using Control Packets in MANETs , 2015 .

[28]  Nitin Khanna,et al.  Critical Review of Techniques for Detection and Mitigation of Co-operative Blackhole Attack in MANET , 2018 .

[29]  Nabendu Chaki,et al.  CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks , 2014, Secur. Commun. Networks.

[30]  Juan-Carlos Cano,et al.  CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes , 2015, IEEE Transactions on Mobile Computing.

[31]  K Somasundaram,et al.  IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET , 2017, Inf. Secur. J. A Glob. Perspect..

[32]  Danista Khan,et al.  Study of detecting and overcoming black hole attacks in MANET: A review , 2017, 2017 International Symposium on Wireless Systems and Networks (ISWSN).

[33]  Hung-Min Sun,et al.  A novel acknowledgment-based approach against collude attacks in MANET , 2012, Expert Syst. Appl..

[34]  Steven Furnell,et al.  Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks , 2008, Ad Hoc Networks.

[35]  Turgay Korkmaz,et al.  EMLTrust: An enhanced Machine Learning based Reputation System for MANETs , 2012, Ad Hoc Networks.

[36]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[37]  Yusheng Ji,et al.  Energy efficient zone based routing protocol for MANETs , 2015, Ad Hoc Networks.

[38]  Anupam Joshi,et al.  Threshold-based intrusion detection in ad hoc networks and secure AODV , 2008, Ad Hoc Networks.

[39]  Leena Ragha,et al.  Implementing and Improving the Performance of AODV by Receive Reply Method and Securing it from Black Hole Attack , 2015 .

[40]  Vimal Kumar,et al.  An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network , 2015 .

[41]  Salvatore Marano,et al.  Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET , 2009, IWCMC.

[42]  R. Leela Velusamy,et al.  A Cooperative Routing for MANET Based on Distributed Trust and Energy Management , 2015, Wirel. Pers. Commun..

[43]  Jigyasu Dubey,et al.  Opinion based trusted AODV routing protocol for MANET , 2016, ICTCS '16.

[44]  Zhang Jianyu,et al.  A novel NP-based security scheme for AODV routing protocol , 2008 .

[45]  Shishupal Kumar,et al.  Detection of Malicious Node Behaviour via I-Watchdog Protocol in Mobile Ad Hoc Network with DSDV Routing Scheme☆ , 2015 .

[46]  Pankaj Chandre,et al.  Dynamic Cluster Head Selection to Detect Gray Hole Attack using Intrusion Detection System in MANETs , 2015, ICCCT '15.

[47]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[48]  Tarek R. Sheltami,et al.  Implementation of A3ACKs Intrusion Detection System under Various Mobility Speeds , 2014, ANT/SEIT.

[49]  S. Saravana Kumar,et al.  Dynamic anomaly detection using cross layer security in MANET , 2017, Comput. Electr. Eng..

[50]  Gisung Kim,et al.  A distributed sinkhole detection method using cluster analysis , 2010, Expert Syst. Appl..

[51]  Elmar Gerhards-Padilla,et al.  TOGBAD - an approach to detect routing attacks in tactical environments , 2011, Secur. Commun. Networks.

[52]  R. Parthasarathy,et al.  Source based trusted AODV routing protocol for mobile ad hoc networks , 2012, ICACCI '12.

[53]  Sehun Kim,et al.  A cooperative-sinkhole detection method for mobile ad hoc networks , 2010 .

[54]  Rutvij H. Jhaveri,et al.  I-EDRI Scheme to Mitigate Grayhole Attack in MANETs , 2015 .

[55]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[56]  William Johnson,et al.  A distributed framework for detecting selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) technique , 2014, EURASIP J. Wirel. Commun. Netw..

[57]  Bu-Sung Lee,et al.  CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS , 2010, Comput. Networks.

[58]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[59]  Y. Venkataramani,et al.  Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network , 2012, Inf. Secur. J. A Glob. Perspect..

[60]  Jaydip Sen,et al.  A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[61]  Manoj Misra,et al.  Misbehaving nodes detection through opinion based trust evaluation model in MANETs , 2011, ICWET.

[62]  N. Kannan,et al.  Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET , 2017, Wirel. Networks.

[63]  Christoforos Ntantogian,et al.  Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks , 2017, Comput. Networks.

[64]  Kathiravan Kannan,et al.  Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks , 2016 .

[65]  Bo Wang,et al.  A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..

[66]  Lyes Khoukhi,et al.  A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks , 2017, Comput. Networks.

[67]  Gabriel Maciá-Fernández,et al.  A model of data forwarding in MANETs for lightweight detection of malicious packet dropping , 2015, Comput. Networks.

[68]  C. N. Sminesh,et al.  A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET , 2016 .

[69]  Mohammad S. Obaidat,et al.  A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks , 2016, Secur. Commun. Networks.

[70]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[71]  Nitin Khanna Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography , 2016 .

[72]  Ali Dorri,et al.  DEBH: detecting and eliminating black holes in mobile ad hoc network , 2018, Wirel. Networks.

[73]  Rituparna Chaki,et al.  BHIDS: a new, cluster based algorithm for black hole IDS , 2010, Secur. Commun. Networks.

[74]  Ilango Krishnamurthi,et al.  Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..

[75]  Nitin Khanna,et al.  Mitigation of Collaborative Blackhole Attack using TRACEROUTE Mechanism with Enhancement in AODV Routing Protocol , 2016 .

[76]  J. K. Mandal,et al.  Detection of Blackhole Behaviour Using Triangular Encryption in NS2 , 2013 .

[77]  Deepika Kukreja,et al.  Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack , 2018, J. Ambient Intell. Humaniz. Comput..

[78]  Koushik Majumder,et al.  Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory , 2015 .

[79]  Hung-Min Sun,et al.  A collaborative routing protocol against routing disruptions in MANETs , 2012, Personal and Ubiquitous Computing.

[80]  Mohammad S. Obaidat,et al.  A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks , 2014, Secur. Commun. Networks.

[81]  Zeinab Movahedi,et al.  A green trust‐distortion resistant trust management scheme on mobile ad hoc networks , 2017, Int. J. Commun. Syst..

[82]  Joni da Silva Fraga,et al.  Algorithms for a distributed IDS in MANETs , 2014, J. Comput. Syst. Sci..

[83]  Michael P. Howarth,et al.  Protection of MANETs from a range of attacks using an intrusion detection and prevention system , 2013, Telecommun. Syst..

[84]  Sandeep Gupta,et al.  EMAODV: Technique to Prevent Collaborative Attacks in MANETs , 2015 .

[85]  Ilango Krishnamurthi,et al.  Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks , 2014 .

[86]  Juan-Carlos Cano,et al.  Accurate detection of black holes in MANETs using collaborative bayesian watchdogs , 2012, 2012 IFIP Wireless Days.

[87]  E. Sathiyamoorthy,et al.  A new trust-based mechanism for detecting intrusions in MANET , 2017, Inf. Secur. J. A Glob. Perspect..

[88]  M. Karthikeyan,et al.  Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2016, Wirel. Pers. Commun..

[89]  Edwin Hsing-Mean Sha,et al.  Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.

[90]  Michael P. Howarth,et al.  An intrusion detection & adaptive response mechanism for MANETs , 2014, Ad Hoc Networks.

[91]  Jose L. Muñoz,et al.  A game theoretic trust model for on-line distributed evolution of cooperation inMANETs , 2011, J. Netw. Comput. Appl..

[92]  M. Rajesh Babu,et al.  A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET , 2016, Wirel. Pers. Commun..

[93]  Ali Dorri,et al.  An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET , 2017, Wirel. Networks.

[94]  Prabir Bhattacharya,et al.  A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..

[95]  G. Usha Devi,et al.  Fuzzy Based Intrusion Detection Systems in MANET , 2015 .

[96]  Manjeet Singh,et al.  Black Hole Attack Detection in MANET Using Mobile Trust Points with Clustering , 2016 .

[97]  P. U. Dere,et al.  Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack , 2016 .

[98]  Ankit D. Patel,et al.  Dual Security Against Grayhole Attack in MANETs , 2015 .

[99]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[100]  K. Selvakumar,et al.  TRUCE – An Adaptive Trust Management Algorithm Over MANET for Service-Based Mobile Computing Environments , 2011, Inf. Secur. J. A Glob. Perspect..

[101]  Anil Kumar Verma,et al.  Experimental analysis of AODV, DSDV and OLSR routing protocol for flying adhoc networks (FANETs) , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).