Abstract
Mobile ad hoc networks are vulnerable to various security attacks due to the fact that a mobile node not only has a freedom of joining or leaving the network but also acts as a router. In this paper, we propose a bullet-proof verification (BPV) method to detect the black hole attack, either single or cooperative, in mobile ad hoc networks. The BPV method consists of two steps: every node first examines suspicious nodes using local neighborhood information and secondly, if a node receives RREP from a suspicious node, it sends an encrypted (bullet-proof) test message to the destination to confirm whether the suspicious node is black hole or not. The two-step approach not only pins down the black hole nodes, but also contributes to reducing control overhead. We prove by resorting to simulation that the BPV can be applied to the AODV without degrading performance notably and also is highly dependable against the black hole attack.
This work was supported by the development program of local science park funded by the ULSAN Metropolitan City and the MEST(Ministry of Education, Science and Technology)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ilyas, M.: The Handbook of Ad Hoc Networks. CRC PRESS, Boca Raton (2002)
Leiner, B.M., Ruth, R.J., Sastry, A.R.: Goals and challenges of the DARPA GloMo program. IEEE Personal Communications 3, 34–43 (1996)
Siva Ram Murthy, C., Manoj, B.S.: Ad hoc Wireless Networks-Architectures and Protocols. Pearson Education, London (2007)
Deng, H., Li, W., Agarwal, D.P.: Routing security in ad hoc networks. IEEE Communications Magazine 40, 70–75 (2002)
Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proc. of IEEE INFOCOM (2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In: Proc. of ACM WiSe (2003)
Yu, W., Sun, Y., Liu, K.R.: HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks. In: Proc. of the 24th IEEE INFOCOM, Miami, USA (2005)
Desilva, S., Boppana, R.V.: Mitigating Malicious Control Packet Floods in Ad Hoc Networks. In: Proc. of IEEE WCNC 2005, pp. 2112–2117 (2005)
Perkins, C.E., Royer, E.M., Das, S.: Ad-hoc On demand Distance Vector (AODV) Routing. In: RFC, p. 3561 (2003)
Kim, G., Han, Y., Kim, S.: A cooperative-sinkhole detection method for mobile ad hoc networks. AEU-International Journal of Electronics and Communications 64, 390–397 (2010)
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: ACM Workshop on Wireless Security, WiSe (2002)
Lee, S., Han, B., Shin, M.: Robust Routing in Wireless Ad Hoc Networks. In: International Conference on Parallel Processing Workshops, pp. 73–78 (2002)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the Sixth Annual Intl. Conference on Mobile Computing and Networking (MOBICOM), pp. 255–265 (2000)
Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting blackhole attack on AODV-based mobile ad hoc networks by Dynamic Learning Method. International Journal of Network Security 5, 338–346 (2007)
Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad-hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, ACM-SE, pp. 96–97 (2004)
Zhang, X., Sekiya, Y., Wakahara, Y.: Proposal of a method to detect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems, pp. 1–6 (2009)
Yu, C.W., Wu, T.-K., Cheng, R.-H., Yu, K.-M., Chang, S.C.: A Distributed and Cooperative Algorithm for the Detection and Elimination of Multiple Black Hole Nodes in Ad Hoc Networks. IEICE Transactions on Communications E92.B, 483–490 (2009)
Johnson David, B., Maltz David, A.: Dynamic source routing in ad hoc wireless networks. Mobile Computing 353, 153–181 (1996)
Sanjay, R., Huirong, F., Sreekantaradhya, et al.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: ICWN, pp. 570–575 (2003)
Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, Englewood Cliffs (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahmed, F., Yoon, S., Oh, H. (2011). Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks. In: Hsu, CH., Yang, L.T., Ma, J., Zhu, C. (eds) Ubiquitous Intelligence and Computing. UIC 2011. Lecture Notes in Computer Science, vol 6905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23641-9_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-23641-9_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23640-2
Online ISBN: 978-3-642-23641-9
eBook Packages: Computer ScienceComputer Science (R0)