Abstract
A Mobile ad hoc network (MANET) is a collection of mobile nodes that rely on co-operation amongst devices that route packets to each other. From a security design perspective, MANETs have no clear line of defense. This lack of security leads the network accessible to both legitimate network users and malicious attackers. A blackhole attack is a severe attack that can be employed against data routing in MANETs. A blackhole is a malicious node that can falsely reply for any route requests without having an active route to a specified destination and drop all the receiving data packets. The attack may even lead to more devastating damage if two or more blackhole nodes cooperate with each other to launch an attack. This type of attack is known as collaborative blackhole attack. In this paper, a novel scheme Detecting Collaborative Blackhole Attacks (so-called DCBA) for detecting collaborative blackhole attacks in MANETs is introduced. Simulation results are provided, demonstrating the superiority of DCBA compared to Dynamic Source Routing (DSR) and the Bait DSR scheme (so-called BDSR) [1] - a recently proposed scheme for detecting and avoiding collaborative blackhole attacks in MANETs - in terms of network throughput rate and minimum packet loss percentage, when collaborative blackhole nodes are present in the network.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Tsou, P.C., Chang, J.M., Lin, Y.H., Chao, H.C., Chen, J.L.: Developing a bdsr scheme to avoid black hole attack based on proactive and reactive architecture in manets. In: 2011 13th International Conference on Advanced Communication Technology (ICACT), Phoenix Park Gangwon-Do, Korea (South), pp. 755–760 (2011)
Tseng, F.H., Chou, L.D., Chao, H.C.: A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences 1, 1–4 (2011)
Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM Workshop on Wireless Security, WiSe 2003, pp. 30–40. ACM, New York (2003)
Khokhar, R.H., Ngadi, A.N., Mandala, A.: A review of current routing attacks in mobile ad hoc networks. International Journal of Computer Science and Security 3, 18–29 (2008)
Royer, E.M., Toh, C.K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications 6, 46–55 (1999)
Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine 40, 70–75 (2002)
Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In: Proceedings of the Future Generation Communication and Networking, FGCN 2007, vol. 02, pp. 362–367. IEEE Computer Society, Washington, DC (2007)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000, pp. 255–265. ACM, New York (2000)
Kozma, W., Lazos, L.: React: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. In: WISEC, pp. 103–110 (2009)
Raj, P.N., Swadas, P.B.: Dpraodv: A dynamic learning system against blackhole attack in aodv based manet. International Journal of Computer Science Issues, IJCSI 2, 54–59 (2009)
Tamilselvan, L., Sankaranarayanan, V.: Prevention of blackhole attack in manet. In: Proceedings of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AUSWIRELESS 2007, pp. 21–28. IEEE Computer Society, Washington, DC (2007)
Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: Proceedings of Intl Conf. on Wireless Networks, Las Vegas, Nevada, USA, pp. 570–575 (2003)
Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2002, pp. 226–236. ACM, New York (2002)
Glomosim, http://pcl.cs.ucla.edu/projects/glomosim/ (last accessed: August 24, 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Woungang, I., Dhurandher, S.K., Peddi, R.D., Traore, I. (2013). Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. In: Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A., Tawbi, N. (eds) Foundations and Practice of Security. FPS 2012. Lecture Notes in Computer Science, vol 7743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37119-6_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-37119-6_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37118-9
Online ISBN: 978-3-642-37119-6
eBook Packages: Computer ScienceComputer Science (R0)