A Novel Taxonomy of Black-Hole Attack Detection Techniques in Mobile Ad-hoc Network (MANET)

Mobile Ad-Hoc Networks (MANETs) are characterized by the lack of infrastructure, dynamic topology, and their use of the open wireless medium. Black-hole attack represents a major threat for such type of networks. The purpose of this paper is two folds. First, to present an extensive survey of the known black-hole detection and prevention approaches. Another objective is to present new dimensions for their classification.

[1]  Djamel Djenouri,et al.  On Detecting Packets Droppers in MANET: A Novel Low Cost Approach , 2007, Third International Symposium on Information Assurance and Security.

[2]  Kwok-Yan Lam,et al.  SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.

[3]  Manpreet Singh,et al.  Defending Wireless Ad Hoc Network from Single and Cooperative Black Holes , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[4]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[5]  Vaduvur Bharghavan,et al.  CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..

[6]  K. S. Rangasamy,et al.  Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection , 2009 .

[7]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[8]  Junhai Luo,et al.  Black hole attack prevention based on authentication mechanism , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[9]  R. S. Bhuvaneswaran,et al.  Design of genetic algorithm based IDS for MANET , 2012, 2012 International Conference on Recent Trends in Information Technology.

[10]  Bhupinder Singh,et al.  Preventing Black Hole Attack in Mobile Ad Hoc Networks using Secure Clustering , 2015 .

[11]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[12]  Govind Sharma,et al.  An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[13]  Subir Kumar Sarkar,et al.  Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .

[14]  S. Radha,et al.  Selfish Scheduler for Packet Scheduling based on Packet Weighted Energy drain rate in MANETs , 2013, J. Comput. Sci..

[15]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[16]  Jaideep Srivastava,et al.  Distributed Intrusion Detection , 2012 .

[17]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[18]  Mona Ghassemian,et al.  Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[19]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[20]  A. Pushpa Trust based secure routing in AODV routing protocol , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[21]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[22]  K Vishnu,et al.  Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks , 2010 .

[23]  Anjali,et al.  Detecting Black Hole Attacks in Wireless Sensor Networks using Mobile Agent , 2012 .

[24]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[25]  Mehdi Medadian,et al.  Combat with Black Hole attack in AODV routing protocol , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).

[26]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[27]  S. Rajashekaran,et al.  Neural Networks, Fuzzy Logic and Genetic Algorithms , 2004 .

[28]  M. Wahengbam,et al.  Intrusion Detection in MANET using fuzzy logic , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.

[29]  S.S. Ramaswami,et al.  Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing , 2006, 2006 IEEE Information Assurance Workshop.

[30]  Yibeltal Fantahun Alem,et al.  Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection , 2010, 2010 2nd International Conference on Future Computer and Communication.

[31]  Vaduvur Bharghavan,et al.  CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[32]  Ming-Yang Su,et al.  Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks , 2010, International Symposium on Parallel and Distributed Processing with Applications.

[33]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[34]  R. H. Jhaveri,et al.  A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[35]  Muhammad Khalid Khan,et al.  Grouped Black hole Attacks Security Model (GBHASM) for wireless Ad-hoc networks , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[36]  Soufiene Djahel,et al.  Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[37]  R.Nallusamy,et al.  Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection , 2009, ArXiv.

[38]  Bing Wu,et al.  Fuzzy Logic based Intrusion Detection System against Blackhole Attack on AODV in MANET , 2011 .

[39]  N. Sharma,et al.  The Black-Hole Node Attack in MANET , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[40]  Bohyung Han,et al.  Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.

[41]  Donald F. Lach,et al.  Crisis in Asia , 1950 .

[42]  Sukla Banerjee Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .

[43]  Lang Tong,et al.  Sensor networks with mobile agents , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..