A survey of black hole attacks in wireless mobile ad hoc networks

The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the existing solutions and discuss the state-of-the-art routing methods. We not only classify these proposals into single black hole attack and collaborative black hole attack but also analyze the categories of these solutions and provide a comparison table. We expect to furnish more researchers with a detailed work in anticipation.

[1]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[2]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[4]  R.A. Raja Mahmood,et al.  A survey on detecting black hole attack in AODV-based mobile ad hoc networks , 2007, 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies.

[5]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[6]  K Vishnu,et al.  Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks , 2010 .

[7]  Yu-Chee Tseng,et al.  GeoGRID: A Geocasting Protocol for Mobile Ad Hoc Networks Based on GRID , 2000 .

[8]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[9]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[10]  Harish Kumar,et al.  COMPARISON BETWEEN VARIOUS BLACK HOLE DETECTION TECHNIQUES IN MANET , 2010 .

[11]  Sukumar Nandi,et al.  Service differentiation using priority-based MAC protocol in MANETs , 2010, Int. J. Internet Protoc. Technol..

[12]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[13]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[14]  Zhao Min,et al.  Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[15]  Bharat Bhargava,et al.  Defending against Collaborative Packet Drop Attacks on MANETs , 2009 .

[16]  Chang-Wu Yu,et al.  A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks , 2007, PAKDD Workshops.

[17]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[18]  Yung-Chieh Lin,et al.  Static and Dynamic RED Tuning for TCP Performance on the Mobile Ad Hoc Networks , 2009 .

[19]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[20]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[21]  William Kozma,et al.  REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits , 2009, WiSec '09.

[22]  Zygmunt J. Haas,et al.  The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .

[23]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[24]  Shiow-Fen Hwang,et al.  A study of recent research trends and experimental guidelines in mobile ad-hoc network , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[25]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[26]  Vincent Park,et al.  Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification , 2001 .

[27]  Bharat Bhargava,et al.  Developing Attack Defense Ideas for Ad Hoc Wireless Networks , 2009 .

[28]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[29]  Djamel Djenouri,et al.  Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .

[30]  Chen-Nee Chuah,et al.  Dynamic measurement-aware routing in practice , 2011, IEEE Network.

[31]  R. Saravanan,et al.  A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.

[32]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[33]  A. Laouiti,et al.  Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..

[34]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[35]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[36]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[37]  Mukesh Zaveri,et al.  Improving AODV Protocol against Blackhole Attacks , 2010 .

[38]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[39]  Brian Haberman,et al.  Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology , 2006, IEEE Communications Magazine.

[40]  Udo W. Pooch,et al.  Detecting black-hole attack in mobile ad hoc networks , 2003 .

[41]  Yu-Chee Tseng,et al.  Secure bootstrapping and routing in an IPv6-based ad hoc network , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[42]  Umang Singh,et al.  Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption , 2010, IET Commun..

[43]  Jiann-Liang Chen,et al.  Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[44]  Ruay-Shiung Chang,et al.  Improving the performance of broadcasting in ad hoc wireless networks , 2001, Proceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001.

[45]  M Sreerama Murty,et al.  Performance Evalution of MANET Routing Protocols using Reference Point Group Mobility and Random WayPoint Models , 2011 .

[46]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.