A Comprehensive Survey and Comparative Analysis of Black Hole Attack in Mobile Ad Hoc Network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
A Comprehensive Survey and Comparative Analysis of Black Hole Attack in Mobile Ad Hoc Network

Authors: Nidhi Gupta, Sanjoy Das, Khushal Singh

Abstract:

A Mobile Ad-hoc Network (MANET) is a self managing network consists of versatile nodes that are capable of communicating with each other without having any fixed infrastructure. These nodes may be routers and/or hosts. Due to this dynamic nature of the network, routing protocols are vulnerable to various kinds of attacks. The black hole attack is one of the conspicuous security threats in MANETs. As the route discovery process is obligatory and customary, attackers make use of this loophole to get success in their motives to destruct the network. In Black hole attack the packet is redirected to a node that actually does not exist in the network. Many researchers have proposed different techniques to detect and prevent this type of attack. In this paper, we have analyzed various routing protocols in this context. Further we have shown a critical comparison among various protocols. We have shown various routing metrics are required proper and significant analysis of the protocol.

Keywords: Black Hole, MANET, Performance Parameters, Routing Protocol.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1091272

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2687

References:


[1] S. Basagni, M. Conti, S. Giordano, I. Stojmenovic, Mobile Ad Hoc Networking, IEEE Press and John Wiley & Sons, Inc., 2004.
[2] S. Murthy and J. Garcia-Luna-Aceves, "An Efficient Routing Protocol for Wireless Networks”, ACM Mobile Networks and Applications Journal, vol.1, no.2, 1996, pp. l83-197.
[3] D. B. Johnan and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks”, Kluwer Academic Publishers, In Mobile Computing, edited by Tomasz Lmielinski and Hank Korth, chapter 5, 1996, pp. 153-181..
[4] C. E. Perkins and E. M. Royer, "Ad-Hoc On-Demand Distance Vector Routing,” Proc. 2nd IEEE Mobile Computer Systems and Applications, 1999, pp. 90–100.
[5] Y. Ko and N.H. Vaidya.," Location-Aided Routing (LAR) in Mobile Ad Hoc Network", ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), 1998, pp. 66-75.
[6] P.V.Jani, "Security within Ad-Hoc Networks”, Position Paper, PAMPAS Workshop, Sept. 16/17 2002.R. W. Lucky, "Automatic Equalization for Digital Communication,” Bell Syst. Tech. J., vol. 44, no. 4, pp. 547–588, Apr. 1965.
[7] K. Biswas and Md. Liaqat Ali, "Security Threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology Sweden, 22nd March 2007.
[8] B. Wu, J. Chen, J. Wu, M. Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless Network Security. On Signals and Communication Technology, Springer, New York, 2009.
[9] N. Bhalaji and A. Shanmugam, "A Trust Based Model to Mitigate Black Hole Attacks in DSR Based Manet”, European Journal of Scientific Research, vol.50 No.1, 2011, pp.6-15.
[10] L. Tamilselvan and Dr. V. Sankaranarayanan, "Prevention of Blackhole Attack in MANET”, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, 0-7695-2842-2/07, 2007.
[11] C. Wu Yu, T-K Wu, R. H. Cheng, and S. C. Chang, "A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks”, PAKDD Workshops, LNAI 4819, 2007, pp. 538–549.
[12] B. V. Santhosh Krishna, A.L Vallikannu, "Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism” International Journal of Scientific & Engineering Research, vol. 1, Issue 3, ISSN 2229-5518, December-2010.
[13] H. Deng, W. Li and D.P. Agrawal, "Routing Security in Wireless Ad Hoc Networks," Communications Magazine, IEEE, vol.40, no.10, October 2002, pp. 70- 75.
[14] B. Sun, Y. Guan, J. Chen , U.W. Pooch , "Detecting Black-hole Attack in Mobile Ad Hoc Networks”, 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22-25 April 2003.
[15] M. Al-Shurman, S-M Yoo, S. Park, "Black Hole Attack in Mobile Ad Hoc Networks”. 42nd Annual ACM Southeast Regional Conference (ACM-SE’42), Huntsville, Alabama, 2-3 April 2004
[16] H. Weerasinghe and H. Fu, "Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, Intenation Journal of Software Engineering and Its Application, Vol.2, No. 3, July, 2008, pp. 39- 54.
[17] S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, K. Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks” International Conference on Wireless Networks, Las Vegas, Nevada, USA, June 2003, pp. 23-26.
[18] D. Djenouri, N. Badache, "Struggling against Selfishness and Black Hole Attacks in MANETs”, Wireless Communications & Mobile Computing, Vol. 8, No. 6, August 2008, pp 689-704.
[19] S.Sharma, Rajshree, R. Prakash, Vivek , "Bluff-Probe Based Black Hole Node Detection and prevention”, IEEE International Advance Computing Conference, 7 March 2009, pp. 458-461.
[20] W. Kozma, L. Lazos , "REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks Based On Random Audits” Second ACM Conference on Wireless Network Security, Zurich, Switzerland, March 2009, pp. 16-18.
[21] F. Oscar, Gonzalez, M. Howarth, and G. Pavlou, "Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks”, 10th IFIP/IEEE International Symposium Integrated Network Management, Centre for Communications Systems Research, University of Surrey, Guildford, UK, May 21, 2007.
[22] W. Wang, B. Bhargava, M. Linderman, "Defending against Collaborative Packet Drop Attacks on MANETs” 2nd International Workshop on Dependable Network Computing and Mobile Systems (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009.
[23] Z. Min, Z. Jiliu "Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks” International Symposium on Information Engineering and Electronic Commerce, Ternopil, Ukraine, 16-17 May 2009.
[24] P.N. Raj, P.B. Swadas, "DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET”, International Journal of Computer Science, Vol. 2, 2009, pp. 54–59.
[25] L. Songbai , L. Longxuan , L. Kwok, J. Lingyan, "SAODV: A MANET Routing Protocol That Can Withstand Black Hole Attack," International Conference on Computational Intelligence and Security, 2009. CIS '09, vol.2, 11-14 Dec. 2009, no., pp.421-425.
[26] M. Medadian, A. Mebadi, E. Shahri, "Combat with Black Hole Attack in AODV Routing Protocol", IEEE 9th Malaysia International Conference on Communication, vol.15, no.17, Dec.2009, pp.530-535.
[27] Vishnu K and Amos J Paul, "Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile ADHOC Networks” International Journal of Computer Applications (0975 - 8887), Volume 1, No. 22, 2010, pp. 38-42.
[28] P. Agrawal, R. K. Ghosh, S. K. Das, "Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks”, 2nd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, 2008, pp. 310-314.
[29] N. Jaisankar, R. Saravanan , K. D. Swamy, "A Novel Security Approach for Detecting Black Hole Attack in MANET”, International Conference on Recent Trends in Business Administration and Information Processing, Thiruvananthapuram, India, 26-27 March 2010.
[30] N. Mistry, D. C. Jinwala, M. Zaveri, "Improving AODV Protocol Against Blackhole Attacks” International Multiconference of Engineers and Computer Scientists, Hong Kong, 17-19 March, 2010.
[31] M-Y Su, "Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems”, IEEE Computer Communications, vol. 34 issue 1, doi:10.1016/j.comcom.2010.08.007, January, 2011, , pp. 107-117.
[32] S. C. Mandhata, S. N. Patro, "A Counter Measure to Black Hole Attack on AODV- Based Mobile Ad-Hoc Networks” International Journal of Computer & Communication Technology (IJCCT), Volume 2, Issue 6, 2011, pp. 37- 42.
[33] A. J. Kamarularifin, Z. Ahmad, J. A. Manan, "Mitigation of Black Hole Attacks for AODV Routing Protocol”, Society of Digital Information and Wireless Communications, Vol. 1, No 2, 2011, pp. 336- 343.
[34] Y. Khamayseh, A. Bader, W. Mardini, and M. BaniYasein, "A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks”, International Journal of Communication Networks and Information Security, Vol. 3, No. 1, April 2011, pp. 36- 47.
[35] P.C. Tsou, J. M. Chang, L, H. C. Chao, J. L. Chen , " Developing a BDSR Scheme to Avoid Black Hole Attack Based on Proactive and Reactive Architecture in MANETs”, 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, Feb. 2011, pp. 13-16.
[36] W. Saetang and S. Charoenpanyasak, "CAODV Free Blackhole Attack in Ad Hoc Networks” International Conference on Computer Networks and Communication Systems, IPCSIT vol.35, 2012, pp. 63- 68.