Honeypot Based Black-Hole Attack Confirmation in a MANET

Black-Hole Attack Confirmation
  • Divya Sai  Keerthi Tiruvakadu
  • Venkataram PallapaEmail author


Many solutions are proposed to identify or prevent the attacks in a Mobile Ad hoc Network. However, sometimes these systems detect false attacks. This could lead to loss of resources in a mobile ad hoc network and cause a downgrade in quality of service. Hence mobile ad hoc networks need a system to confirm the attack before taking further actions. In our work presented in this paper, we propose an attack confirm system for a malicious attacker, called the Black-hole attacker. We present our Black-hole attack Confirmation System, which identifies and confirms the black-hole attack in a mobile ad hoc network using honeypot. The honeypot intelligently identifies all the possible types of black-hole attack using the Black-hole Attack tree, and confirms the attack using the Attack History Database. Together, the Black-hole Attack tree, and Attack History Database aid the honeypot in reducing the false alarms in the mobile ad hoc network. We have simulated the proposed system in several mobile ad hoc network environments of varying sizes of nodes and applications. On several occasions the results have demonstrated that the proposed system is efficient in confirming the black-hole attack and saving the resources and minimizing the path re-establishment.


Black-hole attack Attack-tree Honeypot Attack history Attack confirmation system 


  1. 1.
    Bar, R.K., Mandal, J.K., Singh, M.M.: Qos of manet through trust based aodv routing protocol by exclusion of black hole attack. Procedia Technology 10 (2013). First International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013Google Scholar
  2. 2.
    Brar, S., Angurala, M.: Cooperative black hole attack prevention by particle swarm optimization with multiple swarms. International Journal of Advance Research, Ideas and Innovations in Technology 3(1) (2017).
  3. 3.
    Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials 16(1), 266–282 (2014)CrossRefGoogle Scholar
  4. 4.
    Carvalho, M.: Security in mobile ad hoc networks. IEEE Security Privacy 6(2), 72–75 (2008). CrossRefGoogle Scholar
  5. 5.
    Dorri, A.: An edri-based approach for detecting and eliminating cooperative black hole nodes in manet. Wireless Networks 23(6), 1767–1778 (2017)CrossRefGoogle Scholar
  6. 6.
    Doshi, C.K., Sankaranarayanan, S., Lakshman, V.B., Chandrasekaran, K.: Game theoretic modeling of gray hole attacks in wireless ad hoc networks. In: Proceedings of the International Conference on Signal, Networks, Computing, and Systems, pp. 217–226. Springer (2017)Google Scholar
  7. 7.
    Gerhards-Padilla, E., Aschenbruck, N., Martini, P., Jahnke, M., Tolle, J.: Detecting black hole attacks in tactical manets using topology graphs. In: Local Computer Networks, 2007. LCN 2007. 32nd IEEE Conference on, pp. 1043–1052. IEEE (2007)Google Scholar
  8. 8.
    Keerthi, T.D.S., Venkataram, P.: Aodv route maintenance using honeypots in manets. In: 2015 World Congress on Internet Security (WorldCIS), pp. 105–112 (2015)Google Scholar
  9. 9.
    Khan, F.A., Imran, M., Abbas, H., Durad, M.H.: A detection and prevention system against collaborative attacks in mobile ad hoc networks. Future Generation Computer Systems 68, 416–427 (2017)CrossRefGoogle Scholar
  10. 10.
    Khan, M.S., Midi, D., Khan, M.I., Bertino, E.: Fine-grained analysis of packet loss in manets. IEEE Access 5, 7798–7807 (2017). CrossRefGoogle Scholar
  11. 11.
    Kumar, J., Kulkarni, M., Gupta, D.: Effect of black hole attack on manet routing protocols. International Journal of Computer Network and Information Security 5(5), 64 (2013)CrossRefGoogle Scholar
  12. 12.
    Link, T., Gadong, B.D.: Performance analysis of manet under black hole attack using aodv, olsr and tora. In: Computational Intelligence in Information Systems: Proceedings of the Computational Intelligence in Information Systems Conference (CIIS 2016), vol. 532, p. 198. Springer (2016)Google Scholar
  13. 13.
    Mauw, S., Oostdijk, M.: Foundations of attack trees. In: International Conference on Information Security and Cryptology, pp. 186–198. Springer (2005)Google Scholar
  14. 14.
    Mukesh, K., Khanna, H.P., Velvizhi, R.: An anamoly based intrusion detection system for mobile ad-hoc networks using genetic algorithm based support vector machine. Advances in Natural and Applied Sciences 9(12), 40–45 (2015)Google Scholar
  15. 15.
    Nadeem, A., Howarth, M.P.: A survey of manet intrusion detection and prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials 15(4), 2027–2045 (2013)CrossRefGoogle Scholar
  16. 16.
    Pal, S., Sikdar, B., Chow, J.H.: An online mechanism for detection of gray-hole attacks on pmu data. IEEE Transactions on Smart Grid 9(4), 2498–2507 (2018). CrossRefGoogle Scholar
  17. 17.
    Panos, C., Ntantogian, C., Malliaros, S., Xenakis, C.: Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks 113, 94–110 (2017)CrossRefGoogle Scholar
  18. 18.
    Pathan, A.S.K.: Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, Boca Raton (2016)Google Scholar
  19. 19.
    Ponsam, J.G., Srinivasan, R.: A survey on MANET security challenges, attacks and its countermeasures. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 3(1), 274–279 (2014)Google Scholar
  20. 20.
    Ren, Y., Chuah, M.C., Yang, J., Chen, Y.: Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. In: World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a, pp. 1–6. IEEE (2010)Google Scholar
  21. 21.
    Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Mammeri, A.: Graph-based wormhole attack detection in mobile ad hoc networks (manets). In: 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) (2018)Google Scholar
  22. 22.
    Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, A.: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Transactions on Mobile Computing 16(8), 2174–2183 (2017). CrossRefGoogle Scholar
  23. 23.
    Serrat-Olmos, M.D., Hernández-Orallo, E., Cano, J.C., Calafate, C.T., Manzoni, P.: A collaborative bayesian watchdog for detecting black holes in manets. Intelligent Distributed Computing VI 446, 221–230 (2012)CrossRefGoogle Scholar
  24. 24.
    Shahabi, S., Ghazvini, M., Bakhtiarian, M.: A modified algorithm to improve security and performance of aodv protocol against black hole attack. Wireless Networks 22(5), 1505–1511 (2016)CrossRefGoogle Scholar
  25. 25.
    Shakshuki, E.M., Kang, N., Sheltami, T.R.: Eaacka secure intrusion-detection system for manets. IEEE Transactions on Industrial Electronics 60(3), 1089–1098 (2013)CrossRefGoogle Scholar
  26. 26.
    Shi-Chang, L., Hao-Lan, Y., Qing-Sheng, Z.: Research on manet security architecture design. In: 2010 International Conference on Signal Acquisition and Processing, pp. 90–93 (2010).
  27. 27.
    Thanuja, R., Umamakeswari, A.: Black hole detection using evolutionary algorithm for ids/ips in manets. Cluster Computing (2018). CrossRefGoogle Scholar
  28. 28.
    Tyagi, P., Dembla, D.: A secured routing algorithm against black hole attack for better intelligent transportation system in vehicular ad hoc network. International Journal of Information Technology (2018). CrossRefGoogle Scholar
  29. 29.
    Vishnu, K., Paul, A.J.: Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks. International Journal of Computer Applications 1(22), 38–42 (2010)CrossRefGoogle Scholar
  30. 30.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications 11(1), 38–47 (2004)CrossRefGoogle Scholar
  31. 31.
    Yuan-Ming, D.I.N.G., Hao, W.U: Key node oriented black hole attack and detection. DEStech Transactions on Computer Science and Engineering (2016). CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Divya Sai  Keerthi Tiruvakadu
    • 1
  • Venkataram Pallapa
    • 1
    Email author
  1. 1.Protocol Engineering and Technology Unit, Electrical Communication Engineering DepartmentIndian Institute of ScienceBangaloreIndia

Personalised recommendations