Skip to main content
Log in

DEBH: detecting and eliminating black holes in mobile ad hoc network

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Security in mobile ad hoc network (MANET) is one of the key challenges due to its special features e.g. hop-by-hop communications, dynamic topology, and open network boundary that received tremendous attention by scholars. Traditional security methods are not applicable in MANET due to its special properties. In this paper, a novel approach called detecting and eliminating black holes (DEBH) is proposed that uses a data control packet and an additional black hole check table for detecting and eliminating malicious nodes. Benefiting from trustable nodes, the processing overhead of the security method decreases by passing time. Ad hoc on-demand distance vector (AODV) routing protocol is used as the routing protocol in our design. After finding the freshest path using AODV, our design checks the safety of selected path. In case of detecting any malicious node, it is isolated from the entire network by broadcasting a packet that contains the ID of malicious nodes. Simulation results show that DEBH increases network throughput and decreases packet overhead and delay in comparison with other studied approaches. Moreover, DEBH is able to detect all active malicious nodes which generates fault routing information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63, 4647–4658.

    Article  Google Scholar 

  2. Zehua, W., Yuanzhu, C., & Cheng, L. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 859–868.

    Article  Google Scholar 

  3. Dorri, Ali, & Kamel, Seyed Reza. (2015). A fuzzy congestion controller to detect and balance congestion in WSN. International Journal of Wireless & Mobile Networks, 7(1), 137.

    Article  Google Scholar 

  4. Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15, 2027–2045.

    Article  Google Scholar 

  5. Dorri, A., Kamel, R., & Kheyrkhah, E. (2014). An analyses in security challenges in mobile ad hoc network. Presented at the sixth international conference on Wireless and Mobile networks (WiMoNe 2014).

  6. Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: A survey. International Journal of Computer Science and Engineering Survey (IJCSES), 6(1), 15–29.

    Article  Google Scholar 

  7. Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4, 212–232.

    Article  Google Scholar 

  8. Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Third international conference on advanced computing and communication technologies (ACCT), 2013 (pp. 254–260).

  9. Kalwar, S. (2010). Introduction to reactive protocol. IEEE Potentials, 29, 34–35.

    Article  Google Scholar 

  10. Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & Tutorials, 10, 78–93.

    Article  Google Scholar 

  11. Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.

    Article  Google Scholar 

  12. Kamatchi, V., Mukesh, R., & Rajakumar, (2013). Securing data from black hole attack using AODV routing for mobile ad hoc networks. In N. Meghanathan, D. Nagamalai, & N. Chaki (Eds.), Advances in computing and information technology (Vol. 177, pp. 365–373). Berlin: Springer.

    Chapter  Google Scholar 

  13. Banerjee, S., Sardar, M., & Majumder, K. (2014). AODV based black-hole attack mitigation in MANET. In S. C. Satapathy, S. K. Udgata, & B. N. Biswal (Eds.), Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA) 2013 (Vol. 247, pp. 345–352). Berlin: Springer International Publishing.

    Chapter  Google Scholar 

  14. Lo, N.-W., & Liu, F.-L. (2013). A secure routing protocol to prevent cooperative black hole attack in MANET. In J. Juang & Y.-C. Huang (Eds.), Intelligent technologies and engineering systems (Vol. 234, pp. 59–65). New York: Springer.

    Chapter  Google Scholar 

  15. Jaisankar, N., Saravanan, R., & Swamy, K. D. (2010). A novel security approach for detecting black hole attack in MANET. In V. Das, R. Vijayakumar, N. Debnath, J. Stephen, N. Meghanathan, S. Sankaranarayanan, et al. (Eds.), Information processing and management (Vol. 70, pp. 217–223). Berlin: Springer.

    Chapter  Google Scholar 

  16. Dorri, A., & Nikdel, H. (2013). A new approach for detecting and eliminating cooperative black hole nodes in MANET. Presented at the 7th international conference on information and knowledge technology, Urima.

  17. Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014) Prevention of black hole attack in AODV routing algorithm of MANET using trust based computing. International Journal of Computer Science and Information Technologies, 5, 3254–3258.

    Google Scholar 

  18. Chhari, V., Singh, R., & Dhakad, S. S. (2014). Enhanced and more secure AODV routing protocol to avoid black hole attack in MANET. IJCSNT.

  19. Dorri, A. (2016). An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. International Journal of Wireless Networks. doi:10.1007/s11276-016-1251-x.

    Article  Google Scholar 

  20. Varshney, T., Sharma, T., & Sharma, P. (2014). Implementation of watchdog protocol with AODV in mobile ad hoc network. In Fourth international conference on communication systems and network technologies (CSNT), 2014 (pp. 217–221).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Dorri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dorri, A., Vaseghi, S. & Gharib, O. DEBH: detecting and eliminating black holes in mobile ad hoc network. Wireless Netw 24, 2943–2955 (2018). https://doi.org/10.1007/s11276-017-1516-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1516-z

Keywords

Navigation