Abstract
Blackhole attack is one of the severe attacks in MANET routing protocols. Generation of this attack is simple, which does not require specific tools or sophisticated attack techniques. However, this attack seriously corrupts the routing tables of nodes in the network. Even worse, the attack could increase the chances of losing confidential data and deny network services. Many researchers have proposed a variety of solutions to prevent this Conventional Blackhole Attack (CBA). Unfortunately, none of them has measured the severity of this attack. Filling gaps in measuring the severity of this attack, this research proposes a new security metrics, namely Corruption Routing Table (CRT), Compromising Relay Node (CRN) and Compromising Originator Node (CON). In addition, this research also introduces a new blackhole attack, namely Hybrid Black Hole Attack (HBHA) with two variants — Independent and Cooperative HBHAs. The proposed metrics proved effective in measuring the severity of both CBA and HBHAs. Simulation using Java in Time Simulator/Scalable Wireless Adhoc Network Simulator (JiST/SWANS) showed that Independent HBHA is the most severe attack compared to Cooperative HBHA and CBA. In addition, Cooperative HBHA is the most efficient attack than Independent HBHA and CBA.
Chapter PDF
References
Aad, I., Hubaux, J.P., Knightly, E.W.: Impact of denial of service attacks on ad hoc networks. IEEE/ACM Transactions on Networking 16(4), 791–802 (2008)
Barr, R., Haas, Z.J., van Renesse, R.: Jist: an efficient approach to simulation using virtual machines: Research articles. Softw. Pract. Experience 35, 539–576 (2005)
Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J.P., Le Boudec, J.Y.: Self organization in mobile ad hoc networks: the approach of terminodes. IEEE Communications Magazine 39(6), 166–174 (2001)
Chen, Q., Fadlullah, Z.M., Lin, X., Kato, N.: A clique-based secure admission control scheme for mobile ad hoc networks (manets). Journal of Network and Computer Applications 34(6), 1827–1835 (2011)
Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine 40(10), 70–75 (2002)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Garetto, M., Leonardi, E.: Analysis of random mobility models with partial differential equations. IEEE Transactions on Mobile Computing 6(11), 1204–1217 (2007)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of the INFOCOM 2003, pp. 1976–1986 (April 2003)
Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM Workshop on Wireless Security, pp. 30–40. ACM, New York (2003)
Li, Z., Garcia-Luna-Aceves, J.: Non-interactive key establishment in mobile ad hoc networks. Ad Hoc Networks 5(7), 1194–1203 (2007)
Lu, S., Li, L., Lam, K.Y., Jia, L.: Saodv: A manet routing protocol that can withstand black hole attack. In: Proc. Int. Conf. Computational Intelligence and Security, CIS 2009, vol. 2, pp. 421–425 (2009)
Mandala, S., Ngadi, M.A., Abdullah, A.H., Ismail, A.S.: A variant of merkle signature scheme to protect AODV routing protocol. In: Özcan, A., Chaki, N., Nagamalai, D. (eds.) WiMo 2010. CCIS, vol. 84, pp. 87–98. Springer, Heidelberg (2010)
Ramaswami, S.S., Upadhyaya, S.: Smart handling of colluding black hole attacks in manets and wireless sensor networks using multipath routing. In: Proc. IEEE Information Assurance Workshop, pp. 253–260 (June 2006)
Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B., Shields, C., Belding-Royer, E.: Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications 23(3), 598–610 (2005)
Su, M.Y.: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications 34(1), 107–117 (2011)
Sun, B., Guan, Y., Chen, J., Pooch, U.: Detecting black-hole attack in mobile ad hoc networks. In: Proceeding of Personal Mobile Communications, pp. 490–495 (April 2003)
Tamilselvan, L., Sankaranarayanan, V.: Prevention of co-operative black hole attack in manet. Journal of Networks 3, 13–20 (2008)
Wang, J., Liu, Y., Jiao, Y.: Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications 34(4), 1138–1149 (2011)
Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. International Journal of Software Engineering and Its Applications 2(3), 39–54 (2008)
Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Wireless Network Security, pp. 103–135. Springer US (2007)
Yi, P., Dai, Z., Zhang, S., Zhong, Y.: A new routing attack in mobile ad hoc networks. International Journal of Information Technology 11, 83–94 (2005)
Yoo, Y., Agrawal, D.P.: Why does it pay to be selfish in a manet? IEEE Wireless Communications 13(6), 87–97 (2006)
Zhen, J., Srinivas, S.: Preventing replay attacks for secure routing in ad hoc networks. In: Pierre, S., Barbeau, M., An, H.-C. (eds.) ADHOC-NOW 2003. LNCS, vol. 2865, pp. 140–150. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mandala, S., Jenni, K., Ngadi, M.A., Kamat, M., Coulibaly, Y. (2014). Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-662-44966-0_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44965-3
Online ISBN: 978-3-662-44966-0
eBook Packages: Computer ScienceComputer Science (R0)