Skip to main content

Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8629))

Abstract

Mobile Ad hoc Networks (MANETs) are vulnerable to external threats due to their open access and lack of central point of administration. Black hole attack is a well-known routing attack, in which an attacker node replies to the Route Requests (RREQs) by pretending itself as a neighbor of the destination node in order to get the data. These days, it has become very challenging to secure a network from such attacks. In this paper, we propose a Detection and Prevention System (DPS) to detect black hole attack in MANETs. For this purpose, we deploy some special nodes in the network called DPS nodes, which continuously monitor RREQs broadcasted by other nodes. DPS nodes detect the malicious nodes by observing the behavior of their neighbors. When a node with suspicious behavior is found, DPS node declares that suspicious node as black hole node by broadcasting a threat message. Hence, the black hole node is isolated from the network by rejecting all types of data from it. The simulations in NS-2 show that our proposed DPS mechanism considerably reduces the packet drop ratio with a very low false positive rate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1999), New Orleans, LA, USA, pp. 90–100 (1999)

    Google Scholar 

  2. Mohebi, A., Scott, S.: A survey on detecting black-hole methods in mobile ad hoc networks. Int. J. Innovative Ideas. 13(2), 55–63 (2013)

    Google Scholar 

  3. Mandala, S., Abdullah, A.H., Ismail, A.S., Haron, H., Ngadi, M.A., Coulibaly, Y.: A review of blackhole attack in mobile ad hoc network. In: 3rd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), Bandung, pp. 339–344 (2013)

    Google Scholar 

  4. Tseng, F.-H., Chou, L.-D., Chao, H.-C.: A survey of black hole attacks in wireless mobile ad hoc networks. Hum.-Centric Comput. Inf. Sci. 1(4), 1–16 (2011)

    Google Scholar 

  5. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: International Conference on Wireless Networks (ICWN 2003), Las Vegas, Nevada, USA (2003)

    Google Scholar 

  6. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int. J. Netw. Secur. 5(3), 338–346 (2007)

    Google Scholar 

  7. Tamilselvan, L., Sankaranarayanan, V.: Prevention of co-operative black hole attack in MANET. J. Netw. 3(5), 13–20 (2008)

    Google Scholar 

  8. Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. Int. J. Softw. Eng. Appl. 2(3), 39–54 (2008)

    Google Scholar 

  9. Su, M.-Y., Chiang, K.-L., Liao, W.-C.: Mitigation of black-hole nodes in mobile ad hoc networks. In: International Symposium on Parallel and Distributed Processing with Applications (ISPA), Taipei, Taiwan, pp. 162–167 (2010)

    Google Scholar 

  10. Gupta, S., Kar, S., Dharmaraja, S.: BAAP: blackhole attack avoidance protocol for wireless network. In: International Conference on Computer and Communication Technology (ICCCT), Allahabad, India, pp. 468–473 (2011)

    Google Scholar 

  11. Su, M.-Y.: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput. Commun. 34(1), 107–117 (2011)

    Article  Google Scholar 

  12. Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: A novel approach for GrayHole and BlackHole attacks in mobile ad-hoc networks. In: Second International Conference on Advanced Computing and Communication Technologies (ACCT), Haryana, India, pp. 556–560 (2012)

    Google Scholar 

  13. Chatterjee, N., Mandal, J.K.: Detection of blackhole behaviour using triangular encryption in NS2. In: 1st International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), Procedia Technology, vol. 10, pp. 524–529 (2013)

    Google Scholar 

  14. Tan, S., Kim, K.: Secure route discovery for preventing black hole attacks on AODV-based MANETs. In: International Conference on ICT Convergence (ICTC), Jeju, Korea, pp. 1027–1032 (2013)

    Google Scholar 

  15. Thachil, F., Shet, K.C.: A trust-based approach for AODV protocol to mitigate blackhole attack in MANET. In: International Conference on Computing Sciences (ICCS), Phagwara, pp. 281–285 (2012)

    Google Scholar 

  16. Zhang, X.Y., Sekiya, Y., Wakahara, Y.: Proposal of a method to detect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems, Athens, Greece, pp. 1–6 (2009)

    Google Scholar 

  17. Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)

    Article  Google Scholar 

  18. Kant, R., Gupta, S., Khatter, H.: A literature survey on black hole attacks on AODV protocol in MANET. Int. J. Comput. Appl. 80(16), 22–26 (2013)

    Google Scholar 

  19. Ehsan, H., Khan, F.A.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, pp. 1181–1187 (2012)

    Google Scholar 

  20. Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: IEEE Radio and Wireless Conference, Boston, MA, USA, pp. 75–78 (2003)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the Research Center of College of Computer and Information Sciences, King Saud University, through Grant Number RC131028. The authors are grateful for this support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farrukh Aslam Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Imran, M., Khan, F.A., Abbas, H., Iftikhar, M. (2015). Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks. In: Garcia Pineda, M., Lloret, J., Papavassiliou, S., Ruehrup, S., Westphall, C. (eds) Ad-hoc Networks and Wireless. ADHOC-NOW 2014. Lecture Notes in Computer Science(), vol 8629. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46338-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46338-3_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46337-6

  • Online ISBN: 978-3-662-46338-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics