Skip to main content

Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6905))

Included in the following conference series:

Abstract

Mobile ad hoc networks are vulnerable to various security attacks due to the fact that a mobile node not only has a freedom of joining or leaving the network but also acts as a router. In this paper, we propose a bullet-proof verification (BPV) method to detect the black hole attack, either single or cooperative, in mobile ad hoc networks. The BPV method consists of two steps: every node first examines suspicious nodes using local neighborhood information and secondly, if a node receives RREP from a suspicious node, it sends an encrypted (bullet-proof) test message to the destination to confirm whether the suspicious node is black hole or not. The two-step approach not only pins down the black hole nodes, but also contributes to reducing control overhead. We prove by resorting to simulation that the BPV can be applied to the AODV without degrading performance notably and also is highly dependable against the black hole attack.

This work was supported by the development program of local science park funded by the ULSAN Metropolitan City and the MEST(Ministry of Education, Science and Technology)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ilyas, M.: The Handbook of Ad Hoc Networks. CRC PRESS, Boca Raton (2002)

    Google Scholar 

  2. Leiner, B.M., Ruth, R.J., Sastry, A.R.: Goals and challenges of the DARPA GloMo program. IEEE Personal Communications 3, 34–43 (1996)

    Article  Google Scholar 

  3. Siva Ram Murthy, C., Manoj, B.S.: Ad hoc Wireless Networks-Architectures and Protocols. Pearson Education, London (2007)

    Google Scholar 

  4. Deng, H., Li, W., Agarwal, D.P.: Routing security in ad hoc networks. IEEE Communications Magazine 40, 70–75 (2002)

    Article  Google Scholar 

  5. Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proc. of IEEE INFOCOM (2002)

    Google Scholar 

  6. Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In: Proc. of ACM WiSe (2003)

    Google Scholar 

  7. Yu, W., Sun, Y., Liu, K.R.: HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks. In: Proc. of the 24th IEEE INFOCOM, Miami, USA (2005)

    Google Scholar 

  8. Desilva, S., Boppana, R.V.: Mitigating Malicious Control Packet Floods in Ad Hoc Networks. In: Proc. of IEEE WCNC 2005, pp. 2112–2117 (2005)

    Google Scholar 

  9. Perkins, C.E., Royer, E.M., Das, S.: Ad-hoc On demand Distance Vector (AODV) Routing. In: RFC, p. 3561 (2003)

    Google Scholar 

  10. Kim, G., Han, Y., Kim, S.: A cooperative-sinkhole detection method for mobile ad hoc networks. AEU-International Journal of Electronics and Communications 64, 390–397 (2010)

    Article  Google Scholar 

  11. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: ACM Workshop on Wireless Security, WiSe (2002)

    Google Scholar 

  12. Lee, S., Han, B., Shin, M.: Robust Routing in Wireless Ad Hoc Networks. In: International Conference on Parallel Processing Workshops, pp. 73–78 (2002)

    Google Scholar 

  13. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the Sixth Annual Intl. Conference on Mobile Computing and Networking (MOBICOM), pp. 255–265 (2000)

    Google Scholar 

  14. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting blackhole attack on AODV-based mobile ad hoc networks by Dynamic Learning Method. International Journal of Network Security 5, 338–346 (2007)

    Google Scholar 

  15. Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad-hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, ACM-SE, pp. 96–97 (2004)

    Google Scholar 

  16. Zhang, X., Sekiya, Y., Wakahara, Y.: Proposal of a method to detect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems, pp. 1–6 (2009)

    Google Scholar 

  17. Yu, C.W., Wu, T.-K., Cheng, R.-H., Yu, K.-M., Chang, S.C.: A Distributed and Cooperative Algorithm for the Detection and Elimination of Multiple Black Hole Nodes in Ad Hoc Networks. IEICE Transactions on Communications E92.B, 483–490 (2009)

    Article  Google Scholar 

  18. Johnson David, B., Maltz David, A.: Dynamic source routing in ad hoc wireless networks. Mobile Computing 353, 153–181 (1996)

    Article  Google Scholar 

  19. Sanjay, R., Huirong, F., Sreekantaradhya, et al.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: ICWN, pp. 570–575 (2003)

    Google Scholar 

  20. ns-2, http://www.isi.edu/nsnam/ns/

  21. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, Englewood Cliffs (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahmed, F., Yoon, S., Oh, H. (2011). Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks. In: Hsu, CH., Yang, L.T., Ma, J., Zhu, C. (eds) Ubiquitous Intelligence and Computing. UIC 2011. Lecture Notes in Computer Science, vol 6905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23641-9_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23641-9_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23640-2

  • Online ISBN: 978-3-642-23641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics