Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network

ABSTRACT Security is an essential service for mobile network communications. Routing plays an important role in the security of mobile ad-hoc networks (MANETs). A wide variety of attacks targets the weakness of MANETs. By attacking the routing protocols, attackers can absorb network traffic, injecting themselves into the path between the source and destination. The black hole attack is one of the routing attacks where a malicious node advertise itself as having the shortest path to all nodes in the network by sending fake route reply. In this paper, a defense scheme for detecting black hole node is proposed. The detection is based on the timing information and destination sequence numbers maintained in the Neighborhood Route Monitoring Table. The table maintains the record of time of Reply. A black hole node will send a route reply message without checking the routing table as the legitimate node normally does. This reduced reply time is used to detect the black hole node. To improve the security further, the destination sequence number is checked with the threshold value, which is dynamically updated. The simulation results demonstrate that the protocol not only detects black hole attack but also improves the overall performance.

[1]  Junhai Luo,et al.  Black hole attack prevention based on authentication mechanism , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[2]  Bohyung Han,et al.  Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.

[3]  Houda Labiod,et al.  Towards a flexible security management solution for dynamic MANETs , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[4]  Lloyd G. Greenwald,et al.  Toward the use of local monitoring and network-wide correction to achieve QoS guarantees in mobile ad hoc networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[5]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[6]  Sugata Sanyal,et al.  A distributed security scheme for ad hoc networks , 2004, CROS.

[7]  Jaydip Sen,et al.  A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[8]  Nirwan Ansari,et al.  A router-based technique to mitigate reduction of quality (RoQ) attacks , 2008, Comput. Networks.

[9]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[10]  Nirwan Ansari,et al.  Differentiating Malicious DDoS Attack Traffic from Normal TCP Flows by Proactive Tests , 2006, IEEE Communications Letters.

[11]  Jens Tölle,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .

[12]  N. K. Choudhari,et al.  AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLD , 2010 .

[13]  Mukesh Zaveri,et al.  Improving AODV Protocol against Blackhole Attacks , 2010 .

[14]  S. Dokurer,et al.  Performance analysis of ad-hoc networks under black hole attacks , 2007, Proceedings 2007 IEEE SoutheastCon.

[15]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[16]  Qi Shi,et al.  Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks , 2005, SEC.

[17]  Junwei Chen,et al.  SRSN: Secure Routing Based on Sequence Number for MANETs , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[18]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[19]  Peter Ebinger,et al.  Measuring the impact of attacks on the performance of mobile ad hoc networks , 2009, PE-WASUN '09.

[20]  Peter Martini,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).

[21]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[22]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[23]  Y. Venkataramani,et al.  A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks , 2010, Inf. Secur. J. A Glob. Perspect..

[24]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[25]  Sugata Sanyal,et al.  Security Scheme for Distributed DoS in Mobile Ad Hoc Networks , 2010, ArXiv.

[26]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.