Skip to main content

Cooperative Black-Hole Attack: A Threat to the Future of Wireless Mesh Networking

  • Conference paper
Digital Information Processing and Communications (ICDIPC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 188))

  • 1130 Accesses

Abstract

Wireless Mesh Network has come out to be the next generation wireless communication technology. It provides a good solution to cheap wireless networking. The Network Layer in WMN is responsible for routing packets delivery and intruders take a deep interest in sabotaging this layer. Black-hole attack is a type of Denial-of-Service (DoS) attack which when carried out can disrupt the services of this layer. When the malicious nodes collude, the attack is called Co-operative Black-hole attack and the result of this attack is far more severe. The aim of this paper is to reflect light on the drawbacks of the security mechanisms being used for the mitigation of this attack and propose an improved security schema.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aad, I., Hubaux, P.J., Knightly, W.E.: Impact of Denial-of-Service Attacks on Ad-Hoc Networks. IEEE/ACM Trans. Network 16(4), 791–802 (2008)

    Article  Google Scholar 

  2. Baddache, A., Belmehdi, A.: Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad Hoc Networks. International Journal of Computer Science and Information Security (IJCSIS) 7(1), 10–16 (2010)

    Google Scholar 

  3. Deng, H., Li, W., Agarwal, P.D.: Routing Security in Wireless Ad-hoc Networks. IEEE Communications Magazine 40(10), 70–75 (2002)

    Article  Google Scholar 

  4. Imani, M., Rajabi, M.E., Taheri, M., Naderi, M.: Vulnerabilities in Network Layer at WMN. In: International Conference on Educational and Network Technology (ICENT 2010), Qinhuangdao, China, pp. 487–492 (2010)

    Google Scholar 

  5. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  6. Munoz, L.J., Forne, J., Esparaza, O., Soriano, M.: Certificate Revocation System Implementation Based on the Merkle Hash Tree. International Journal of Information Security 2(2), 110–124 (2004)

    Article  Google Scholar 

  7. Nait-Abdesselam, F., Bensaou, B., Taleb, T.: Detecting and Avoiding Wormhole Attacks in Wireless Ad-Hoc Networks. IEEE Communication Magazine 46(4), 127–133 (2008)

    Article  Google Scholar 

  8. Ramaswami, S.S., Upadhyaya, S.: Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing. In: IEEE Workshop on Information Assurance, New York, USA, pp. 253–260 (2006)

    Google Scholar 

  9. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. In: International Conference on Wireless Networks (ICWN 2003), Las Vegas, Nevada, USA, pp. 570–575 (2003)

    Google Scholar 

  10. Siddiqui, S.M., Hong, S.C.: Security Issues in Wireless Mesh Networks. In: IEEE International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), Seoul, South Korea, pp. 717–722 (2007)

    Google Scholar 

  11. Tamilselvan, L., Sankarnarayanan, V.: Prevention of Blackhole Attack in MANET. In: 2nd International Conference on Wireless Broadband and Ultraband Communications, Sydney, Australia, p. 21 (2007)

    Google Scholar 

  12. Weerasinghe, H., Fu, H.: Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. In: Future Generation Communication and Networking (FGCN), Jeju, South Korea, pp. 362–367 (2007)

    Google Scholar 

  13. Yin, J., Madria, S.: A Hierarchical Secure Routing Protocol against Black Hole. In: IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, Taichung, Taiwan, p. 8 (2006)

    Google Scholar 

  14. Zhang, V., Zheng, J., Hu, H.: Security in Wireless Mesh Networks. Auerbach Publications, Florida (2009)

    Google Scholar 

  15. Zhao, M., Zhou, J.: Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks. In: International Symposium on Information Engineering and Electronic Commerce, Ternopil, Ukraine, p. 26 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Om, S., Talib, M. (2011). Cooperative Black-Hole Attack: A Threat to the Future of Wireless Mesh Networking. In: Snasel, V., Platos, J., El-Qawasmeh, E. (eds) Digital Information Processing and Communications. ICDIPC 2011. Communications in Computer and Information Science, vol 188. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22389-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22389-1_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22388-4

  • Online ISBN: 978-3-642-22389-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics