Detection and removal of co-operative blackhole and grayhole attacks in MANETs

A MANET, by definition, comprises of nodes which are mobile. It has a dynamic topology and lacks a central controlling entity. These features along with undefined and unsecure boundaries make its security a very challenging issue. Blackhole and grayhole attacks can in fact seriously compromise the performance of a critical infrastructure like a MANET. In this paper we propose a mechanism to detect and remove the blackhole and grayhole attacks. The solution we are proposing tackles these attacks by maintaining an Extended Data Routing Information (EDRI) Table at each node in addition to the Routing Table of the AODV protocol. The mechanism is capable of detecting a malicious node. It also maintains a history of the node's previous malicious instances to account for the gray behaviour. Refresh packet, Renew Packet, BHID Packet, Further request and Further reply packets are also used in addition to the existing packets (RREQ and RREP). Our technique is capable of finding chain of cooperating malicious nodes which drop a significant fraction of packets.

[1]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[2]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[3]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[4]  Jean-Yves Le Boudec,et al.  A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.

[5]  George Pavlou,et al.  An Algorithm to Detect Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks , 2007, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management.

[6]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[7]  H Deng,et al.  ROUTING SECURITY IN AD HOC NETWORKS , 2002 .

[8]  Songwu Lu,et al.  SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[10]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[11]  George Pavlou,et al.  Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks , 2007, WWIC.

[12]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[13]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[14]  Ning Liu,et al.  The Simulation and Comparison of Routing Attacks on DSR Protocol , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[15]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[16]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.