Abstract
Wireless Mesh Network has come out to be the next generation wireless communication technology. It provides a good solution to cheap wireless networking. The Network Layer in WMN is responsible for routing packets delivery and intruders take a deep interest in sabotaging this layer. Black-hole attack is a type of Denial-of-Service (DoS) attack which when carried out can disrupt the services of this layer. When the malicious nodes collude, the attack is called Co-operative Black-hole attack and the result of this attack is far more severe. The aim of this paper is to reflect light on the drawbacks of the security mechanisms being used for the mitigation of this attack and propose an improved security schema.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aad, I., Hubaux, P.J., Knightly, W.E.: Impact of Denial-of-Service Attacks on Ad-Hoc Networks. IEEE/ACM Trans. Network 16(4), 791–802 (2008)
Baddache, A., Belmehdi, A.: Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad Hoc Networks. International Journal of Computer Science and Information Security (IJCSIS) 7(1), 10–16 (2010)
Deng, H., Li, W., Agarwal, P.D.: Routing Security in Wireless Ad-hoc Networks. IEEE Communications Magazine 40(10), 70–75 (2002)
Imani, M., Rajabi, M.E., Taheri, M., Naderi, M.: Vulnerabilities in Network Layer at WMN. In: International Conference on Educational and Network Technology (ICENT 2010), Qinhuangdao, China, pp. 487–492 (2010)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Munoz, L.J., Forne, J., Esparaza, O., Soriano, M.: Certificate Revocation System Implementation Based on the Merkle Hash Tree. International Journal of Information Security 2(2), 110–124 (2004)
Nait-Abdesselam, F., Bensaou, B., Taleb, T.: Detecting and Avoiding Wormhole Attacks in Wireless Ad-Hoc Networks. IEEE Communication Magazine 46(4), 127–133 (2008)
Ramaswami, S.S., Upadhyaya, S.: Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing. In: IEEE Workshop on Information Assurance, New York, USA, pp. 253–260 (2006)
Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. In: International Conference on Wireless Networks (ICWN 2003), Las Vegas, Nevada, USA, pp. 570–575 (2003)
Siddiqui, S.M., Hong, S.C.: Security Issues in Wireless Mesh Networks. In: IEEE International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), Seoul, South Korea, pp. 717–722 (2007)
Tamilselvan, L., Sankarnarayanan, V.: Prevention of Blackhole Attack in MANET. In: 2nd International Conference on Wireless Broadband and Ultraband Communications, Sydney, Australia, p. 21 (2007)
Weerasinghe, H., Fu, H.: Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. In: Future Generation Communication and Networking (FGCN), Jeju, South Korea, pp. 362–367 (2007)
Yin, J., Madria, S.: A Hierarchical Secure Routing Protocol against Black Hole. In: IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, Taichung, Taiwan, p. 8 (2006)
Zhang, V., Zheng, J., Hu, H.: Security in Wireless Mesh Networks. Auerbach Publications, Florida (2009)
Zhao, M., Zhou, J.: Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks. In: International Symposium on Information Engineering and Electronic Commerce, Ternopil, Ukraine, p. 26 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Om, S., Talib, M. (2011). Cooperative Black-Hole Attack: A Threat to the Future of Wireless Mesh Networking. In: Snasel, V., Platos, J., El-Qawasmeh, E. (eds) Digital Information Processing and Communications. ICDIPC 2011. Communications in Computer and Information Science, vol 188. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22389-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-22389-1_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22388-4
Online ISBN: 978-3-642-22389-1
eBook Packages: Computer ScienceComputer Science (R0)