Skip to main content

A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs

  • Conference paper
Book cover Advances in Computing and Communications (ACC 2011)

Abstract

The unique features of mobile ad hoc networks (potential nodes and link mobility) raise certain requirements for the security mechanism. A particularly challenging problem is how to feasibly detect and screen possible attacks on routing protocols such as Byzantine and Black hole attacks. This work focus on detecting routing Black Hole and Byzantine routing attacks through security and trust based routing. A secure auto configuration scheme is adapted and enhanced with secure public-key distribution to authorize the nodes joining the Mobile Ad hoc Network (MANET). Integrity in messages between source and destination is achieved via public key cryptographic mechanism and keyed Hash MAC over a shared secret key. The proposed schemes can be integrated with the existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). Introducing security mechanisms over routing in MANETs might cause significant overhead and power consumption. Hence a security mechanism considering the tradeoff between security and energy consumption is proposed. A routing algorithm to establish parallel routes in order to build trust over paths and nodes in those paths is devised. So, that compromising nodes can be detected and paths involving those nodes are ignored. The proposed protocol “Secure Routing Protocol to combat Byzantine and Black Hole attacks” (SRPBB) is implemented in ns2 for throughput analysis in presence of attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yu, M., Zhou, M., Su, W.: A Secure Routing Protocol against Byzantine Attacks for MANETs in Adversarial Environments. IEEE Transactions On Vehicular Technology 58(1) (January 2009)

    Google Scholar 

  2. Bhalaji, N., Shanmugam, A.: Association between Nodes to Combat Blackhole Attack in DSR based Manet. In: IEEE WOCN 2009 Conference Program Cairo, Cairo, Egypt (2009)

    Google Scholar 

  3. Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proc. 4th IEEE Workshop Mobile Comput. Syst. Appl., pp. 3–13 (June 2002)

    Google Scholar 

  4. Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Commun. 23(3), 598–610 (2005)

    Article  Google Scholar 

  5. Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C.: ODSBR: An On-Demand Secure Byzantine Routing Protocol. JHU CS Tech. Rep.Ver.1 (October 15, 2003)

    Google Scholar 

  6. Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In: WiSe 2003, San Diego, California, USA (September 19, 2003)

    Google Scholar 

  7. Zhou, H., Mutak, M.W., Ni, L.M.: Secure Autoconfiguration and Public-key Distribution for Mobile Ad-hoc Networks. In: IEEE 6th International Conference on Mobile Ad hoc and Sensor Systems, MASS 2009 (2009) Secure Autoconfiguration and Public-key Distribution for Mobile Ad-hoc Networks. In: IEEE 6th International Conference on Mobile Ad hoc and Sensor Systems, MASS 2009 (2009)

    Google Scholar 

  8. Wang, P., Reeves, D.S., Ning, P.: Secure Address Autoconfiguration for Mobile Ad Hoc Networks. In: Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), San Diego, CA, pp. 519–521 (July 2005)

    Google Scholar 

  9. Cavalli, A., Orset, J.-M.: Secure Hosts Autoconfiguration in Mobile Ad Hoc Networks. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCSW 2004), Tokyo, Japan (March 2004)

    Google Scholar 

  10. Hu, S., Mitchell, C.J.: Improving IP address autoconfiguration security in mANETs using trust modelling. In: Jia, X., Wu, J., He, Y. (eds.) MSN 2005. LNCS, vol. 3794, pp. 83–92. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., Kato, N.: A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks. IEEE Transactions On Vehicular Technology 58(5) (June 2009)

    Google Scholar 

  12. Bai, F., Sadagopan, N., Helmy, A.: BRICS: A Building-block approach for analyzing Routing protocols in ad hoc networks - a Case Study of reactive routing protocols. In: IEEE International Conference on Communications (ICC) (June 2004)

    Google Scholar 

  13. Johnson, D.B., Maltz Josh Broch, D.A.: DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. RFC 4728 (February 2007)

    Google Scholar 

  14. Lu, S., Li1, L., Lam, K.-Y., Jia, L.: SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. In: IEEE International Conference on Computational Intelligence and Security (2009)

    Google Scholar 

  15. Sadagopan, N., Bai, F., Krishnamachari, B., Helmy, A.: PATHS: Analysis of PATH Duration Statistics and their Impact on Reactive MANET Routing Protocols. In: ACM International Symposium on Mobile Ad Hoc Networking & Computing (2003)

    Google Scholar 

  16. Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., Kato, N.: A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks. IEEE Transactions On Vehicular Technology 58(5) (June 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Padmanabhan, J., Subramaniam, T.S.R., Prakasam, K., Ponpandiyan, V. (2011). A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 193. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22726-4_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22726-4_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22725-7

  • Online ISBN: 978-3-642-22726-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics