68
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Detection of Cooperative Black Hole Attack in Wireless Ad Hoc Networks

      Preprint

      Read this article at

          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Protecting the network layer of a MANET from malicious attacks is an important and challenging security issue, since most of the routing protocols for MANETs are vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process but drops all packets in the data forwarding phase. This attack becomes more severe when a group of malicious nodes cooperate each other. The proposed mechanism does not apply any cryptographic primitives on the routing messages. Instead, it protects the network by detecting and reacting to malicious activities of the nodes. Simulation results show that the scheme has a significantly high detection rate with moderate network traffic overhead and computation overhead in the nodes.

          Related collections

          Most cited references4

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Mitigating routing misbehavior in mobile ad hoc networks

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            The quest for security in mobile ad hoc networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Effective intrusion detection using multiple sensors in wireless ad hoc networks

                Bookmark

                Author and article information

                Journal
                2013-02-20
                Article
                1302.4882
                f3c898e8-da6b-4ccf-8ae8-b83773f39e61

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                International Journal of Simulation,Systems,Science and Technology. Vol 12, No 4, August 2011
                8 pages, 14 figures, 2 tables. This journal paper is an extended version of the already published conference paper of the author which is having arXiv identifier: arXiv:1111.0387. arXiv admin note: the majority of this single-authored submission is identical to arXiv:1111.0387, co-authored with two others
                cs.CR cs.NI

                Security & Cryptology,Networking & Internet architecture
                Security & Cryptology, Networking & Internet architecture

                Comments

                Comment on this article