Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency

Abstract Due to its scarce energy sources, and the open nature of transmissions in wireless environments, the wide spread of MANETs is challenged by many factors. Energy efficiency and security issues are considered of the utmost factors, security threats are represented by many attacks, one of which is the vicious Black Hole Attack. In Black Hole Attack, malicious nodes try to engage in as many active connections as possible to jeopardize the scarce network resources. To engage in a connection, during the route discover process, the malicious node sends a prompt route reply message to the source node to acknowledge it has an active route to the destination node, and when it receives the data packets it will simply drop it. Black holes jeopardize the network performance in terms of packet delivery ratio and number of dropped packets. Detecting and neutralizing black hole node is an important task to utilize the network resources efficiently. Network devices spend more than 80% of its available power on communication rather than on processing. Designing an energy-efficient detection scheme is vital to prolong the network lifetime as it reduces the amount of traffic transmitted in the network. The proposed mechanism requires a minimal change to the routing protocol and a minimal overhead to the network. The proposed scheme benefits from the open transmission nature of wireless devices (i.e. minimizing energy consumption) and tries to build a cooperative environment to monitor and observe the behaviour of on-going transmission. In the proposed algorithm, the source node utilizes other nodes in the network (called observer node) to detect if the transmission of data packets to next hop is carried. In case of error, the observer node sends an error message (namely, OERR) to the source node. Upon receiving a repetitive OERR messages, the source node marks the observed intermediate node as a black hole. The performance of the proposed scheme is evaluated using simulation. The obtained results indicate the superiority of the proposed scheme. For example, the proposed algorithm enhances the delivery ratio in dense networks by 45.6% and in by 41% in sparse networks. Moreover, it enhances the dropped packet in dense networks by 75%, and by 63% in sparse networks.

[1]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[2]  Jagpreet Singh,et al.  Performance Analysis of MANET under Blackhole Attack , 2009, 2009 First International Conference on Networks & Communications.

[3]  K Somasundaram,et al.  IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET , 2017, Inf. Secur. J. A Glob. Perspect..

[4]  Shadi Aljawarneh,et al.  A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.

[5]  Rich McMahon Introduction to Networking , 2003 .

[6]  Prodipto Das,et al.  Security Measures for Black Hole Attack in MANET: An Approach , 2012, ArXiv.

[7]  Kamarularifin Abd. Jali,et al.  MITIGATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOL , 2011 .

[8]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[9]  Irshad Ullah,et al.  Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .

[10]  Shadi Aljawarneh,et al.  Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..

[11]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[12]  Sugata Sanyal,et al.  Journal of Digital Information Management Impact of Node Mobility on Manet Routing Protocols Models , 2022 .

[13]  Daya Gupta,et al.  Effect of Black Hole Attack on MANET Routing Protocols , 2013 .

[14]  A. L. Sangal,et al.  "Performance Analysis of DSR, AODV Routing Protocols based on Wormhole Attack in Mobile Adhoc Network" , 2011 .

[15]  Vahid Heydari,et al.  E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs , 2016, Wirel. Networks.

[16]  Seokhoon Yoon,et al.  An Efficient Black Hole Detection Method using an Encrypted Verification Message in Mobile Ad Hoc Networks , 2012 .

[17]  Amol A. Bhosle,et al.  Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET , 2012 .

[18]  Christian Bonnet,et al.  Mobility models for vehicular ad hoc networks: a survey and taxonomy , 2009, IEEE Communications Surveys & Tutorials.

[19]  Ashwini Patil,et al.  Blackhole attack detection and prevention by real time monitoring , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[20]  Muneer O. Bani Yassein,et al.  A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks , 2011, Int. J. Commun. Networks Inf. Secur..

[21]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[22]  Sakuna Charoenpanyasak,et al.  CAODV Free Bl ackhole Attack in Ad Hoc Networks , 2012 .