Advertisement

Black Hole Attack Prevention in Wireless Peer-to-Peer Networks: A New Strategy

  • Peter Ndajah
  • Abdoul Ousmane Matine
  • Mahouton Norbert Hounkonnou
Article
  • 2 Downloads

Abstract

Mobile peer-to-peer networking (MP2P) is a relatively new paradigm compared to other wireless network technologies. In the last 10–15 years, it has gained tremendous popularity because of its usefulness in applications such as file sharing over the Internet in a decentralized manner. Security of mobile P2P networks represents an open research topic and a main challenge regarding the vulnerability of these networks and their convenience to different security attacks such as black hole, Sybil, etc. In this work, we analyze the black hole attack in wireless P2P networks using the AODV as the routing protocol. In a black hole attack, a malicious node assumes the identity of a legitimate node, by creating forged answers with a higher sequence number, and thus forces the victim node to prioritize it as a relay node. We propose a solution based on a modification of the AODV routing protocol, taking into account the behavior of each node participating in the network. The performances of our proposal are evaluated by simulation.

Keywords

Wireless network P2P Peer-to-peer Black hole ns-2 

References

  1. 1.
    Y. Challal, Sécurité de l’Internet des Objets: Vers Une Approche Cognitive et Systémique des Réseaux et Télécommunications. Université de Technologie de Compiègne, 2012.Google Scholar
  2. 2.
    B. Wu, et al., A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, Department of Computer Science and Engineering, Florida Atlantic University, SpringerBerlin, 2006.Google Scholar
  3. 3.
    D. Alexandre and E. Samuel, Peet-to-Peer, Master Professionnel, Système Informatique et Réseaux, Université Claude Bernard, Lyon, 2007.Google Scholar
  4. 4.
    A. Benoit, Algorithmique des Réseaux et des Télécoms, Chapitre 2: Réseaux Pair-à-Pair. ENS Lyon, 2006.Google Scholar
  5. 5.
    G. Pujolle, Les Réseaux, EYROLLESParis, 2008.Google Scholar
  6. 6.
    R. Al King, Localisation de Sources de Données et Optimisation de Requêtes Réparties en Environnement Pair-à-Pair. Thèse de Doctorat, Université de Toulouse, 2010.Google Scholar
  7. 7.
    Y. Huang and W. Lee, Attack analysis and detection for ad hoc routing protocols. In Proceedings of 7th International Symposium on Recent Advances in Intrusion Detection (RAID). Springer, 2004.Google Scholar
  8. 8.
    A. Esnault, Systèmes Pair-à-Pair pour l’Informatique Opportuniste. Réseaux et Télécommunications, Université de Bretagne Sud, 2017.Google Scholar
  9. 9.
    A. Hajami, Sécurité du Routage dans les Réseaux sans Fil Spontanés. Thèse de Doctorat, Université Mohammed V Souissi, Maroc, 2011.Google Scholar
  10. 10.
    N. Tabbane, S. Tabbane and A. Mehaoua, Simulation et Mésure des Performances du Protocole de Routage AODV. JTEA 2004, Hamamet, Tunisie, 2004.Google Scholar
  11. 11.
    Abdellaoui Rachid and Jean-Marc Robert, SUOLSR: A New Solution to Thwart Attacks Against the OLSR Protocol, Ecole de Technologie SupérieureMontreal, 2009.Google Scholar
  12. 12.
    P. Ning and K. Sun, How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols. In Proceedings of IEEE Systems, Man and Cybernetics Society, Information Assurance Workshop (IAW’03). IEEE, June 2003.Google Scholar
  13. 13.
    M. A. Ayachi, Contributions à la Détection des Comportements Malhonnêtes dans les Réseaux Ad Hoc AODV par Analyse de la Confiance Implicite. Thèse de Doctorat, Université de Rennes 1, 2011.Google Scholar
  14. 14.
    D. Raffo, Security Schemes for the OLSR Protocol for Ad Hoc Networks. Ph.D. Thesis, Université de Paris, 2005.Google Scholar
  15. 15.
    Maha Abdelhaq, et al., Security routing mechanism for black hole attack over AODV MANET routing protocol, Australian Journal of Basic and Applied Sciences, Vol. 5, No. 10, pp. 1137–1145, 2011.Google Scholar
  16. 16.
    K. Lakshmi, et al., Modified AODV protocol against black hole attacks in MANET, International Journal of Engineering and Technology, Vol. 2, No. 6, pp. 444–449, 2010.Google Scholar
  17. 17.
    H. Deng, W. Li and D. P. Agrawal, Routing security in wireless ad hoc networks. Communications Magazine, IEEE, October 2002.Google Scholar
  18. 18.
    M. Al-Shurman, S. Yoo, and S. Park, Black hole attack in mobile ad hoc networks. In ACM Southeast Regional Conference, 2004.Google Scholar
  19. 19.
    L. Tamilselvan and V. Sankaranarayanan, Prevention of black hole attack in MANET. In The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Aus Wireless, 2007.Google Scholar
  20. 20.
    L. Himral, V. Vig, and N. Chand, Preventing AODV routing protocol from black hole attack, International Journal of Engineering Science and Technology (IJEST), Vol.3, No. 5, pp. 3927–3932, 2011.Google Scholar
  21. 21.
    P. N. Raj and P. B. Swadas, DPRAODV: A dynamic learning system against black hole attack in AODV-based MANET, IJCSI International Journal of Computer Science Issues, Vol. 2, pp. 54–59, 2009.Google Scholar
  22. 22.
    S. C. Mandhata and S. N. Patro, A counter measure to black hole attack on AODV-based mobile ad-hoc networks, International Journal of Computer and Communication Technology (IJCCT), Vol. 2, No. VI, pp. 37–42, 2011.Google Scholar
  23. 23.
    S. V. Mallapur and S. R. Patil, Survey on simulation tools for mobile ad-hoc networks, International Journal of Computer Networks and Wireless Communication, Vol. 2, No. 2, pp. 241–248, 2012.Google Scholar
  24. 24.
    V. Legrand and S. Ubda, Vers un Modèle de Confiance pour les Objets Communicants: Une Approche Sociale, Laboratoire CITI INRIA ARES, 2004.Google Scholar
  25. 25.
    N. Kalia and H. Sharma, Detection of multiple black hole nodes attack in MANET by modifying the AODV protocol, Lovely Professional University PhagwaraPunjab, 2016.Google Scholar
  26. 26.
    F. J. Ros and P. M. Ruiz, Implementing a New Manet Unicast Routing Protocol in ns-2, Dept. of Information and Communication Engineering, University of MurciaMurcia, 2004.Google Scholar
  27. 27.
    K. Fall and K. Varadhan, The ns Manual, University of CaliforniaBerkeley, 2011.Google Scholar
  28. 28.
    V. Vasanthi et al, A detailed study of mobility models in wireless sensor networks, Journal of Theoretical and Applied Information Technology, Vol. 33, No. 1, pp. 7–14, 2011.MathSciNetGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.University of the Commonwealth CaribbeanKingstonJamaica
  2. 2.Institut de Formation et de Recherche en InformatiqueUniversité d’Abomey CalaviCotonouRepublic of Benin
  3. 3.International Chair in Mathematical Physiques and ApplicationsUniversité d’Abomey CalaviCotonouRepublic of Benin

Personalised recommendations