Skip to main content

Intercepting Blackhole Attacks in MANETs: An ASM-based Model

  • Conference paper
  • First Online:
Software Engineering and Formal Methods (SEFM 2017)

Abstract

The inherent features of Mobile Ad-hoc NETworks (MANETs) make them vulnerable to various kinds of security attacks. In particular, in a so-called blackhole attack, one or more malicious hosts can send fake routing information towards an initiator, compromising the reliability of the network in the whole. In this paper, we propose a refinement of the NACK-based Ad-hoc On-demand Distance Vector (N-AODV) protocol, namely Blackhole-free N-AODV (BN-AODV), as a solution to intercept (cooperative) blackhole attacks in MANETs. Thanks to a formalization through an Abstract State Machine-based model, the correctness of the proposed protocol is formally proved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agrawal, D., Zeng, Q.: Introduction to Wireless and Mobile Systems. Thomson Brooks/Cole, Pacific Grove (2003)

    Google Scholar 

  2. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in MANET. IEEE Wirel. Commun. 14(5), 85–91 (2007)

    Article  Google Scholar 

  3. Tseng, F.H., Chou, L.D., Chao, H.C.: A survey of black hole attacks in wireless MANET. Hum.-Centric Comput. Inf. Sci. 1, 4 (2011)

    Article  Google Scholar 

  4. Agrawal, P., Ghosh, R.K., Das, S.K.: Cooperative black and gray hole attacks in mobile ad hoc networks. In: 2nd International Conference on Ubiquitous Information Management and Communication, pp. 310–314 (2008)

    Google Scholar 

  5. Bianchi, A., Pizzutilo, S., Vessio, G.: Preliminary description of NACK-based ad-hoc on-demand distance vector routing protocol for MANETs. In: 9th International Conference on Software: Engineering and Applications, pp. 500–505 (2014)

    Google Scholar 

  6. Bianchi, A., Pizzutilo, S., Vessio, G.: CoreASM-based evaluation of the N-AODV protocol for mobile ad-hoc networks. J. Mobile Multimedia 12, 31–51 (2016)

    Google Scholar 

  7. Börger, E., Stärk, R.: Abstract State Machines: A Method for High-Level System Design and Analysis. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-642-18216-7

    Book  MATH  Google Scholar 

  8. Gurevich, Y.: Evolving algebras 1993: Lipari guide. In: Börger, E. (ed.) Specification and Validation Methods. Oxford University Press, pp. 9–36 (1995)

    Google Scholar 

  9. Börger, E.: High level system design and analysis using abstract state machines. In: Hutter, D., Stephan, W., Traverso, P., Ullmann, M. (eds.) FM-Trends 1998. LNCS, vol. 1641, pp. 1–43. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48257-1_1

    Chapter  Google Scholar 

  10. Gurevich, Y., Rossman, B., Schulte, W.: Semantic Essence of AsmL. Theor. Comput. Sci. 342(3), 370–412 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  11. Farahbod, R., Gervasi, V., Glässer, U.: CoreASM: An Extensible ASM Execution Engine. Fundamenta Informaticae 77(1–2), 71–103 (2007)

    MathSciNet  MATH  Google Scholar 

  12. Gargantini, A., Riccobene, E., Scandurra, P.: Model-driven language engineering: the ASMETA case study. In: 3rd International Conference on Software Engineering Advances, pp. 373–378 (2008)

    Google Scholar 

  13. Jayakumar, G., Gopinath, G.: Performance comparison of two on-demand routing protocols for ad-hoc networks based on random way point mobility model. Am. J. Appl. Sci. 5(6), 659–664 (2008)

    Article  Google Scholar 

  14. Goyal, P.: Simulation study of comparative performance of AODV, OLSR, FSR and LAR routing protocols in MANET in large scale scenarios. In: World Congress of Information and Communication Technologies, pp. 283–286 (2012)

    Google Scholar 

  15. Singh, A., Ramakrishnan, C.R., Smolka, S.A.: A process calculus for mobile ad hoc networks. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 296–314. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68265-3_19

    Chapter  Google Scholar 

  16. Merro, M.: An observational theory for mobile ad hoc networks. Inf. Comput. 207(2), 194–208 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  17. Fehnker, A., Glabbeek, R.V., Höfner, P., McIver, A., Portmann, M., Tan, W.L.: A process algebra for wireless mesh networks. In: 21st European Symposium on Programming, pp. 295–315 (2012)

    Google Scholar 

  18. Delzanno, G., Sangnier, A., Zavattaro, G.: Parameterized verification of ad hoc networks. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol. 6269, pp. 313–327. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15375-4_22

    Chapter  Google Scholar 

  19. Bianchi, A., Pizzutilo, S.: Studying MANET through a Petri net-based model. In: 2nd International Conference of Evolving Internet, pp. 220–225 (2010)

    Google Scholar 

  20. Bianchi, A., Pizzutilo, S.: A Coloured nested Petri nets model for discussing MANET properties. Int. J. Multimedia Technol. 3(2), 38–44 (2013)

    Google Scholar 

  21. Xiong, C., Murata, T., Tsai, J.: Modeling and simulation of routing protocol for MANET using colored petri nets. In: Conference on Application and Theory of Petri Nets: Formal Methods in Software Engineering and Defence Systems, vol. 12, pp. 145–153 (2002)

    Google Scholar 

  22. Xiong, C., Murata, T., Leigh, J.: An approach for verifying routing protocols in mobile ad hoc networks using Petri nets. In: 6th IEEE Symposium on Circuits and Systems, vol. 2, pp. 537–540 (2004)

    Google Scholar 

  23. Erbas, F., Kyamakya, K., Jobmann, K.: Modelling and performance analysis of a novel position-based reliable unicast and multicast routing method using coloured Petri nets. In: Vehicular Technology Conference, vol. 5, pp. 3099–3104 (2003)

    Google Scholar 

  24. Jahanian, M.H., Amin, F., Jahangir, A.H.: Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets. In: 6th International Conference on the Information and Communication Systems, pp. 222–227 (2015)

    Google Scholar 

  25. Jensen, K., Kristensen, L.M., Wells, L.: Coloured Petri nets and CPN tools for modelling and validation of concurrent systems. Int. J. Softw. Tools Technol. Transf. 9(3–4), 213–254 (2007)

    Article  Google Scholar 

  26. Börger, E.: Modeling distributed algorithms by abstract state machines compared to Petri nets. In: Butler, M., Schewe, K.-D., Mashkoor, A., Biro, M. (eds.) ABZ 2016. LNCS, vol. 9675, pp. 3–34. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33600-8_1

    Chapter  Google Scholar 

  27. Reisig, W.: The expressive power of abstract state machines. Comput. Inform. 22, 209–219 (2003)

    MathSciNet  MATH  Google Scholar 

  28. Dershowitz, N.: The generic model of computation. In: Electronic Proceedings in Theoretical Computer Science (2013)

    Google Scholar 

  29. Gurevich, Y.: Sequential abstract state machines capture sequential algorithms. ACM Trans. Comput. Logic 1(1), 77–111 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  30. Blass, A., Gurevich, Y.: Abstract state machines capture parallel algorithms. ACM Trans. Comput. Logic 4(4), 578–651 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  31. Glausch, A., Reisig, W.: An ASM-characterization of a class of distributed algorithms. In: Abrial, J.-R., Glässer, U. (eds.) Rigorous Methods for Software Construction and Analysis. LNCS, vol. 5115, pp. 50–64. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-11447-2_4

    Chapter  Google Scholar 

  32. Börger, E., Schewe, K.D.: Concurrent abstract state machines. Acta Informatica 53(5), 469–492 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  33. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting blackhole attack in mobile ad hoc networks. In: 5th Conference on Personal Mobile Communications, pp. 490–495 (2003)

    Google Scholar 

  34. Al-Shurman, M., Yoo, S.M., Park, S.: Black hole attack in mobile ad hoc network. In: 42nd Annual Southeast Regional Conference, pp. 96–97 (2004)

    Google Scholar 

  35. Tamilselvan, L., Sankaranarayanan, V.: Prevention of blackhole attack in MANET. In: 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, p. 21 (2007)

    Google Scholar 

  36. Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. Int. J. Comput. Sci. Issues 2, 54–59 (2009)

    Google Scholar 

  37. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: International Conference on Wireless Networks (2003)

    Google Scholar 

  38. Tamilselvan, L., Sankaranarayanan, V.: Prevention of co-operative black hole attack in MANET. J. Netw. 3(5), 13–20 (2008)

    Google Scholar 

  39. Perkins, C.E., Belding-Royer, E., Das, S.R.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (2003). http://tools.ietf.org/html/rfc3561

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alessandro Bianchi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bianchi, A., Pizzutilo, S., Vessio, G. (2018). Intercepting Blackhole Attacks in MANETs: An ASM-based Model. In: Cerone, A., Roveri, M. (eds) Software Engineering and Formal Methods. SEFM 2017. Lecture Notes in Computer Science(), vol 10729. Springer, Cham. https://doi.org/10.1007/978-3-319-74781-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74781-1_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74780-4

  • Online ISBN: 978-3-319-74781-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics