Skip to main content

Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks

  • Conference paper
Security in Computing and Communications (SSCC 2014)

Abstract

Blackhole attack is one of the severe attacks in MANET routing protocols. Generation of this attack is simple, which does not require specific tools or sophisticated attack techniques. However, this attack seriously corrupts the routing tables of nodes in the network. Even worse, the attack could increase the chances of losing confidential data and deny network services. Many researchers have proposed a variety of solutions to prevent this Conventional Blackhole Attack (CBA). Unfortunately, none of them has measured the severity of this attack. Filling gaps in measuring the severity of this attack, this research proposes a new security metrics, namely Corruption Routing Table (CRT), Compromising Relay Node (CRN) and Compromising Originator Node (CON). In addition, this research also introduces a new blackhole attack, namely Hybrid Black Hole Attack (HBHA) with two variants — Independent and Cooperative HBHAs. The proposed metrics proved effective in measuring the severity of both CBA and HBHAs. Simulation using Java in Time Simulator/Scalable Wireless Adhoc Network Simulator (JiST/SWANS) showed that Independent HBHA is the most severe attack compared to Cooperative HBHA and CBA. In addition, Cooperative HBHA is the most efficient attack than Independent HBHA and CBA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aad, I., Hubaux, J.P., Knightly, E.W.: Impact of denial of service attacks on ad hoc networks. IEEE/ACM Transactions on Networking 16(4), 791–802 (2008)

    Article  Google Scholar 

  2. Barr, R., Haas, Z.J., van Renesse, R.: Jist: an efficient approach to simulation using virtual machines: Research articles. Softw. Pract. Experience 35, 539–576 (2005)

    Article  Google Scholar 

  3. Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J.P., Le Boudec, J.Y.: Self organization in mobile ad hoc networks: the approach of terminodes. IEEE Communications Magazine 39(6), 166–174 (2001)

    Article  Google Scholar 

  4. Chen, Q., Fadlullah, Z.M., Lin, X., Kato, N.: A clique-based secure admission control scheme for mobile ad hoc networks (manets). Journal of Network and Computer Applications 34(6), 1827–1835 (2011)

    Article  Google Scholar 

  5. Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine 40(10), 70–75 (2002)

    Article  Google Scholar 

  6. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Garetto, M., Leonardi, E.: Analysis of random mobility models with partial differential equations. IEEE Transactions on Mobile Computing 6(11), 1204–1217 (2007)

    Article  Google Scholar 

  8. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of the INFOCOM 2003, pp. 1976–1986 (April 2003)

    Google Scholar 

  9. Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM Workshop on Wireless Security, pp. 30–40. ACM, New York (2003)

    Google Scholar 

  10. Li, Z., Garcia-Luna-Aceves, J.: Non-interactive key establishment in mobile ad hoc networks. Ad Hoc Networks 5(7), 1194–1203 (2007)

    Article  Google Scholar 

  11. Lu, S., Li, L., Lam, K.Y., Jia, L.: Saodv: A manet routing protocol that can withstand black hole attack. In: Proc. Int. Conf. Computational Intelligence and Security, CIS 2009, vol. 2, pp. 421–425 (2009)

    Google Scholar 

  12. Mandala, S., Ngadi, M.A., Abdullah, A.H., Ismail, A.S.: A variant of merkle signature scheme to protect AODV routing protocol. In: Özcan, A., Chaki, N., Nagamalai, D. (eds.) WiMo 2010. CCIS, vol. 84, pp. 87–98. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  13. Ramaswami, S.S., Upadhyaya, S.: Smart handling of colluding black hole attacks in manets and wireless sensor networks using multipath routing. In: Proc. IEEE Information Assurance Workshop, pp. 253–260 (June 2006)

    Google Scholar 

  14. Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B., Shields, C., Belding-Royer, E.: Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications 23(3), 598–610 (2005)

    Article  Google Scholar 

  15. Su, M.Y.: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications 34(1), 107–117 (2011)

    Article  Google Scholar 

  16. Sun, B., Guan, Y., Chen, J., Pooch, U.: Detecting black-hole attack in mobile ad hoc networks. In: Proceeding of Personal Mobile Communications, pp. 490–495 (April 2003)

    Google Scholar 

  17. Tamilselvan, L., Sankaranarayanan, V.: Prevention of co-operative black hole attack in manet. Journal of Networks 3, 13–20 (2008)

    Article  Google Scholar 

  18. Wang, J., Liu, Y., Jiao, Y.: Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications 34(4), 1138–1149 (2011)

    Article  Google Scholar 

  19. Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. International Journal of Software Engineering and Its Applications 2(3), 39–54 (2008)

    Google Scholar 

  20. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Wireless Network Security, pp. 103–135. Springer US (2007)

    Google Scholar 

  21. Yi, P., Dai, Z., Zhang, S., Zhong, Y.: A new routing attack in mobile ad hoc networks. International Journal of Information Technology 11, 83–94 (2005)

    Google Scholar 

  22. Yoo, Y., Agrawal, D.P.: Why does it pay to be selfish in a manet? IEEE Wireless Communications 13(6), 87–97 (2006)

    Article  Google Scholar 

  23. Zhen, J., Srinivas, S.: Preventing replay attacks for secure routing in ad hoc networks. In: Pierre, S., Barbeau, M., An, H.-C. (eds.) ADHOC-NOW 2003. LNCS, vol. 2865, pp. 140–150. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mandala, S., Jenni, K., Ngadi, M.A., Kamat, M., Coulibaly, Y. (2014). Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44966-0_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44965-3

  • Online ISBN: 978-3-662-44966-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics