Abstract
The inherent features of Mobile Ad-hoc NETworks (MANETs) make them vulnerable to various kinds of security attacks. In particular, in a so-called blackhole attack, one or more malicious hosts can send fake routing information towards an initiator, compromising the reliability of the network in the whole. In this paper, we propose a refinement of the NACK-based Ad-hoc On-demand Distance Vector (N-AODV) protocol, namely Blackhole-free N-AODV (BN-AODV), as a solution to intercept (cooperative) blackhole attacks in MANETs. Thanks to a formalization through an Abstract State Machine-based model, the correctness of the proposed protocol is formally proved.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agrawal, D., Zeng, Q.: Introduction to Wireless and Mobile Systems. Thomson Brooks/Cole, Pacific Grove (2003)
Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in MANET. IEEE Wirel. Commun. 14(5), 85–91 (2007)
Tseng, F.H., Chou, L.D., Chao, H.C.: A survey of black hole attacks in wireless MANET. Hum.-Centric Comput. Inf. Sci. 1, 4 (2011)
Agrawal, P., Ghosh, R.K., Das, S.K.: Cooperative black and gray hole attacks in mobile ad hoc networks. In: 2nd International Conference on Ubiquitous Information Management and Communication, pp. 310–314 (2008)
Bianchi, A., Pizzutilo, S., Vessio, G.: Preliminary description of NACK-based ad-hoc on-demand distance vector routing protocol for MANETs. In: 9th International Conference on Software: Engineering and Applications, pp. 500–505 (2014)
Bianchi, A., Pizzutilo, S., Vessio, G.: CoreASM-based evaluation of the N-AODV protocol for mobile ad-hoc networks. J. Mobile Multimedia 12, 31–51 (2016)
Börger, E., Stärk, R.: Abstract State Machines: A Method for High-Level System Design and Analysis. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-642-18216-7
Gurevich, Y.: Evolving algebras 1993: Lipari guide. In: Börger, E. (ed.) Specification and Validation Methods. Oxford University Press, pp. 9–36 (1995)
Börger, E.: High level system design and analysis using abstract state machines. In: Hutter, D., Stephan, W., Traverso, P., Ullmann, M. (eds.) FM-Trends 1998. LNCS, vol. 1641, pp. 1–43. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48257-1_1
Gurevich, Y., Rossman, B., Schulte, W.: Semantic Essence of AsmL. Theor. Comput. Sci. 342(3), 370–412 (2005)
Farahbod, R., Gervasi, V., Glässer, U.: CoreASM: An Extensible ASM Execution Engine. Fundamenta Informaticae 77(1–2), 71–103 (2007)
Gargantini, A., Riccobene, E., Scandurra, P.: Model-driven language engineering: the ASMETA case study. In: 3rd International Conference on Software Engineering Advances, pp. 373–378 (2008)
Jayakumar, G., Gopinath, G.: Performance comparison of two on-demand routing protocols for ad-hoc networks based on random way point mobility model. Am. J. Appl. Sci. 5(6), 659–664 (2008)
Goyal, P.: Simulation study of comparative performance of AODV, OLSR, FSR and LAR routing protocols in MANET in large scale scenarios. In: World Congress of Information and Communication Technologies, pp. 283–286 (2012)
Singh, A., Ramakrishnan, C.R., Smolka, S.A.: A process calculus for mobile ad hoc networks. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 296–314. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68265-3_19
Merro, M.: An observational theory for mobile ad hoc networks. Inf. Comput. 207(2), 194–208 (2009)
Fehnker, A., Glabbeek, R.V., Höfner, P., McIver, A., Portmann, M., Tan, W.L.: A process algebra for wireless mesh networks. In: 21st European Symposium on Programming, pp. 295–315 (2012)
Delzanno, G., Sangnier, A., Zavattaro, G.: Parameterized verification of ad hoc networks. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 313–327. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15375-4_22
Bianchi, A., Pizzutilo, S.: Studying MANET through a Petri net-based model. In: 2nd International Conference of Evolving Internet, pp. 220–225 (2010)
Bianchi, A., Pizzutilo, S.: A Coloured nested Petri nets model for discussing MANET properties. Int. J. Multimedia Technol. 3(2), 38–44 (2013)
Xiong, C., Murata, T., Tsai, J.: Modeling and simulation of routing protocol for MANET using colored petri nets. In: Conference on Application and Theory of Petri Nets: Formal Methods in Software Engineering and Defence Systems, vol. 12, pp. 145–153 (2002)
Xiong, C., Murata, T., Leigh, J.: An approach for verifying routing protocols in mobile ad hoc networks using Petri nets. In: 6th IEEE Symposium on Circuits and Systems, vol. 2, pp. 537–540 (2004)
Erbas, F., Kyamakya, K., Jobmann, K.: Modelling and performance analysis of a novel position-based reliable unicast and multicast routing method using coloured Petri nets. In: Vehicular Technology Conference, vol. 5, pp. 3099–3104 (2003)
Jahanian, M.H., Amin, F., Jahangir, A.H.: Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets. In: 6th International Conference on the Information and Communication Systems, pp. 222–227 (2015)
Jensen, K., Kristensen, L.M., Wells, L.: Coloured Petri nets and CPN tools for modelling and validation of concurrent systems. Int. J. Softw. Tools Technol. Transf. 9(3–4), 213–254 (2007)
Börger, E.: Modeling distributed algorithms by abstract state machines compared to Petri nets. In: Butler, M., Schewe, K.-D., Mashkoor, A., Biro, M. (eds.) ABZ 2016. LNCS, vol. 9675, pp. 3–34. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33600-8_1
Reisig, W.: The expressive power of abstract state machines. Comput. Inform. 22, 209–219 (2003)
Dershowitz, N.: The generic model of computation. In: Electronic Proceedings in Theoretical Computer Science (2013)
Gurevich, Y.: Sequential abstract state machines capture sequential algorithms. ACM Trans. Comput. Logic 1(1), 77–111 (2000)
Blass, A., Gurevich, Y.: Abstract state machines capture parallel algorithms. ACM Trans. Comput. Logic 4(4), 578–651 (2003)
Glausch, A., Reisig, W.: An ASM-characterization of a class of distributed algorithms. In: Abrial, J.-R., Glässer, U. (eds.) Rigorous Methods for Software Construction and Analysis. LNCS, vol. 5115, pp. 50–64. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-11447-2_4
Börger, E., Schewe, K.D.: Concurrent abstract state machines. Acta Informatica 53(5), 469–492 (2016)
Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting blackhole attack in mobile ad hoc networks. In: 5th Conference on Personal Mobile Communications, pp. 490–495 (2003)
Al-Shurman, M., Yoo, S.M., Park, S.: Black hole attack in mobile ad hoc network. In: 42nd Annual Southeast Regional Conference, pp. 96–97 (2004)
Tamilselvan, L., Sankaranarayanan, V.: Prevention of blackhole attack in MANET. In: 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, p. 21 (2007)
Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. Int. J. Comput. Sci. Issues 2, 54–59 (2009)
Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: International Conference on Wireless Networks (2003)
Tamilselvan, L., Sankaranarayanan, V.: Prevention of co-operative black hole attack in MANET. J. Netw. 3(5), 13–20 (2008)
Perkins, C.E., Belding-Royer, E., Das, S.R.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (2003). http://tools.ietf.org/html/rfc3561
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Bianchi, A., Pizzutilo, S., Vessio, G. (2018). Intercepting Blackhole Attacks in MANETs: An ASM-based Model. In: Cerone, A., Roveri, M. (eds) Software Engineering and Formal Methods. SEFM 2017. Lecture Notes in Computer Science(), vol 10729. Springer, Cham. https://doi.org/10.1007/978-3-319-74781-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-74781-1_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74780-4
Online ISBN: 978-3-319-74781-1
eBook Packages: Computer ScienceComputer Science (R0)