Skip to main content

Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7743))

Abstract

A Mobile ad hoc network (MANET) is a collection of mobile nodes that rely on co-operation amongst devices that route packets to each other. From a security design perspective, MANETs have no clear line of defense. This lack of security leads the network accessible to both legitimate network users and malicious attackers. A blackhole attack is a severe attack that can be employed against data routing in MANETs. A blackhole is a malicious node that can falsely reply for any route requests without having an active route to a specified destination and drop all the receiving data packets. The attack may even lead to more devastating damage if two or more blackhole nodes cooperate with each other to launch an attack. This type of attack is known as collaborative blackhole attack. In this paper, a novel scheme Detecting Collaborative Blackhole Attacks (so-called DCBA) for detecting collaborative blackhole attacks in MANETs is introduced. Simulation results are provided, demonstrating the superiority of DCBA compared to Dynamic Source Routing (DSR) and the Bait DSR scheme (so-called BDSR) [1] - a recently proposed scheme for detecting and avoiding collaborative blackhole attacks in MANETs - in terms of network throughput rate and minimum packet loss percentage, when collaborative blackhole nodes are present in the network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tsou, P.C., Chang, J.M., Lin, Y.H., Chao, H.C., Chen, J.L.: Developing a bdsr scheme to avoid black hole attack based on proactive and reactive architecture in manets. In: 2011 13th International Conference on Advanced Communication Technology (ICACT), Phoenix Park Gangwon-Do, Korea (South), pp. 755–760 (2011)

    Google Scholar 

  2. Tseng, F.H., Chou, L.D., Chao, H.C.: A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences 1, 1–4 (2011)

    Article  Google Scholar 

  3. Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM Workshop on Wireless Security, WiSe 2003, pp. 30–40. ACM, New York (2003)

    Chapter  Google Scholar 

  4. Khokhar, R.H., Ngadi, A.N., Mandala, A.: A review of current routing attacks in mobile ad hoc networks. International Journal of Computer Science and Security 3, 18–29 (2008)

    Google Scholar 

  5. Royer, E.M., Toh, C.K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications 6, 46–55 (1999)

    Article  Google Scholar 

  6. Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine 40, 70–75 (2002)

    Article  Google Scholar 

  7. Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In: Proceedings of the Future Generation Communication and Networking, FGCN 2007, vol. 02, pp. 362–367. IEEE Computer Society, Washington, DC (2007)

    Google Scholar 

  8. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000, pp. 255–265. ACM, New York (2000)

    Google Scholar 

  9. Kozma, W., Lazos, L.: React: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. In: WISEC, pp. 103–110 (2009)

    Google Scholar 

  10. Raj, P.N., Swadas, P.B.: Dpraodv: A dynamic learning system against blackhole attack in aodv based manet. International Journal of Computer Science Issues, IJCSI 2, 54–59 (2009)

    Google Scholar 

  11. Tamilselvan, L., Sankaranarayanan, V.: Prevention of blackhole attack in manet. In: Proceedings of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AUSWIRELESS 2007, pp. 21–28. IEEE Computer Society, Washington, DC (2007)

    Google Scholar 

  12. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: Proceedings of Intl Conf. on Wireless Networks, Las Vegas, Nevada, USA, pp. 570–575 (2003)

    Google Scholar 

  13. Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2002, pp. 226–236. ACM, New York (2002)

    Chapter  Google Scholar 

  14. Glomosim, http://pcl.cs.ucla.edu/projects/glomosim/ (last accessed: August 24, 2012)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Woungang, I., Dhurandher, S.K., Peddi, R.D., Traore, I. (2013). Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. In: Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A., Tawbi, N. (eds) Foundations and Practice of Security. FPS 2012. Lecture Notes in Computer Science, vol 7743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37119-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37119-6_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37118-9

  • Online ISBN: 978-3-642-37119-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics