skip to main content
10.1145/3377644.3377658acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

Routing Authentication Chain Mechanism to Resist AODV Black Hole Attacks

Authors Info & Claims
Published:26 February 2020Publication History

ABSTRACT

The black hole attack is a main kind of attack against the ad hoc on demand distance vector (AODV) protocol in ad hoc networks. A much greater threat is a joint attack of multiple black holes. To prevent black hole attacks, this paper proposes an authentication chain mechanism based on the secure recursive function, by which the successive nodes of a route are unified only on the deterministic state transition relation of the recursive function to implement a unique association for security, such that the whole route forms an authentication chain. With the mechanism of this paper, even if a pseudorandom linear sequence is adopted as a kind of simple recursive function, as long as its linear complexity is greater than the number of nodes in the authenticating chain, the attacker cannot obtain continuous state values of more than two times the linear complexity of the sequence, Thus the secure authentication of the route can be guaranteed. Therefore, the mechanism and method presented in this paper represent a novel and effective approach to defend against black hole attacks.

References

  1. Sanzgiri K, Dahill B, Laflamme D. Routing for Ad hoc Networks[C]. IEEE Journal on Selected Areas in Communications (Special Issue on Wireless Ad hoc Networks), 2005, 23(3): 598--610Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Das S R, Beldingroyer E M, Perkins C E. Ad hoc On-Demand Distance Vector (AODV) Routing[M]. RFC Editor, 2003.Google ScholarGoogle Scholar
  3. S Othmen, f arai, a belghith et al, Secure routing protocol based on Weil paring for multi-hop cellular network (SRPMCN) [J], Int. J. Comput. Sci. Netw. Security, vol. 16, no. 6, pp. 117--124,2016.Google ScholarGoogle Scholar
  4. Y C Hu, A Perrig, D B Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks[J], Wireless Netw., vol. 11, nos. 1-2, pp. 21--38, 2005Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S Othmen, F Zarai, M S Obaidat, et al, Secure and optimal routing protocol for multi-hop cellular networks[J], in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), San Diego, CA, USA,2015, pp. 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  6. W J Fan, L Zhou. Mechanism and method of secure routing authentication based on SEND [J]. Journal of Beijing university of information science and technology (natural science), 2015(2):14--19.Google ScholarGoogle Scholar
  7. Y. C. Hu, d. Johnson, a. Perrig, Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks[C], in Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), pp. 3--13, June 2002Google ScholarGoogle Scholar
  8. Zapata M G, Asokan N. Securing Ad Hoc Routing Protocols[C]// Proceedings of the 2002 ACM Workshop on Wireless Security, Atlanta, GA, USA, September 28, 2002. ACM, 2002.DOI= http://doi.acm.org/10.1145/570681.570682Google ScholarGoogle Scholar
  9. M Yu, M Zhou, W Su, A secure routing protocol against byzantine attacks for MANETs in adversarial environments[J], IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp. 449--461, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  10. P Sachan, P M Khilar, Securing AODV routing protocol in MANET based on cryptographic authentication mechanism[J], International Journal of Network Security and Its Applications (IJNSA), vol. 3, no. 5, 2011Google ScholarGoogle Scholar
  11. Jalil K A, Ahmad Z, Manan J L A, Securing routing table update in AODV routing protocol[C]// 2011 IEEE Conference on Open Systems. IEEE, 2011.Google ScholarGoogle Scholar
  12. N Nissar, N Naja, A Jamali, Lightweight authentication-based scheme for AODV in ad-hoc networks[C], 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), Fez, 2017, pp. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  13. R Kumar, S Tripathi, R Agrawal, A secure handshaking aodv routing protocol (SHS-AODV) [C], 2018-4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, 2018, pp. 1--5.Google ScholarGoogle Scholar
  14. Z Wan. Algebra and coding [M]. Higher education press, 2007.Google ScholarGoogle Scholar

Index Terms

  1. Routing Authentication Chain Mechanism to Resist AODV Black Hole Attacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy
        January 2020
        160 pages
        ISBN:9781450377447
        DOI:10.1145/3377644

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 February 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader