skip to main content
10.1145/2905055.2905133acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks

Published: 04 March 2016 Publication History

Abstract

A mobile ad hoc network (MANET) is an infrastructure-less network of various mobile devices and generally known for its self configuring behavior. MANET can communicate over relatively bandwidth constrained wireless links. Due to limited bandwidth battery power and dynamic network, topology routing in MANET is a challenging issue. Collaborative attacks are particularly serious issues in MANET. Attacks are liable to occur if routing algorithms fail to detect prone threats and to find as well as remove malicious nodes. Our objective is to examine and improve the performance of network diminished by variety of attacks. The performance of MANET network is examined under Black hole, Wormhole and Sybil attacks using Performance matrices and then major issues which are related to these attacks are addressed.

References

[1]
M. Al-Shurman, S.-M. Yoo, and S. Park. Black hole attack in mobile ad hoc networks. In Proceedings of the 42Nd Annual Southeast Regional Conference, ACM-SE 42, pages 96--97, New York, NY, USA, 2004. ACM.
[2]
K. Biswas, M. L. Ali, K. Biswas, M. L. Ali, and R. Gustavsson. Security threats in mobile ad hoc network. Master's thesis, Blekinge Institute of Technology, Sweden, 2007.
[3]
Y. chun Hu. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM 2003, San Francisco, CA, USA, 2003.
[4]
H. Deng, W. Li, and D. P. Agrawal. Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10):70--75, Oct 2002.
[5]
J. R. Douceur. The sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pages 251--260, London, UK, UK, 2002. Springer-Verlag.
[6]
M. KS and G. Aghila. Article: A survey on black hole attacks on aodv protocol in manet. International Journal of Computer Applications, 34(5):23--30, November 2011. Full text available.
[7]
R. Maulik and N. Chaki. A comprehensive review on wormhole attacks in manet. In 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), pages 233--238, Oct 2010.
[8]
R. Maulik and N. Chaki. A study on wormhole attacks in manet. International Journal of Computer Information Systems and Industrial Management Applications, IJCISIM, 2011.
[9]
A. Nadeem and M. Howarth. Adaptive intrusion detection & prevention of denial of service attacks in manets. In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC '09, pages 926--930, New York, NY, USA, 2009. ACM.
[10]
P. Papadimitratos and Z. J. Haas. Securing the internet routing infrastructure. IEEE Communications Magazine, 40(10):60--68, Oct 2002.
[11]
G. A. PequeÃśo, J. R. Rivera, and S. A. Kassler. Extension to mac 802.11 for performance improvement in manet. Master's thesis, Karlstads University, Sweden, 2006.
[12]
M. Pirretti, S. Zhu, V. Narayanan, P. Mcdaniel, M. K, and R. Brooks. The sleep deprivation attack in sensor networks: Analysis and methods of defense. International Journal of Distributed Sensor Networks, 2(3):267--287, 2006.

Cited By

View all
  • (2023)A Recent Survey on Intrusion Detection Methods for Wireless Networks2023 IEEE World AI IoT Congress (AIIoT)10.1109/AIIoT58121.2023.10174448(0471-0476)Online publication date: 7-Jun-2023
  • (2018)A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless NetworksWireless Personal Communications: An International Journal10.1007/s11277-018-5778-2101:3(1581-1618)Online publication date: 1-Aug-2018
  1. Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
      March 2016
      843 pages
      ISBN:9781450339629
      DOI:10.1145/2905055
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 March 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Blackhole
      2. MANET
      3. Sybil Attack
      4. Wormhole

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICTCS '16

      Acceptance Rates

      Overall Acceptance Rate 97 of 270 submissions, 36%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 30 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A Recent Survey on Intrusion Detection Methods for Wireless Networks2023 IEEE World AI IoT Congress (AIIoT)10.1109/AIIoT58121.2023.10174448(0471-0476)Online publication date: 7-Jun-2023
      • (2018)A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless NetworksWireless Personal Communications: An International Journal10.1007/s11277-018-5778-2101:3(1581-1618)Online publication date: 1-Aug-2018

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media