A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET
Author(s): SAIED, Jafarian; MEHDI, Sadeghzadeh
Author(s) keywords: Black hole attack, intrusion detection, Mobile ad hoc Networks (MANETs), Routing Protocol AODV, security
Reference keywords: intrusion detection
Abstract:
Nowadays mobile ad hoc networks (MANETs) are much more popular and efficient than before. Therefore, the concept of security is of high importance in such networks. Security has become one of the most important issues in scientific debates in grounds of information exchange. Existence of destructive attacks is one of the problems that have challenged security in case networks. Black hole attack is one of the attacks in this case. In this research a new algorithm is introduced in order to identify destructive nodes of black holes in routing protocol of case networks. Through sending empty packets to efficient nodes that are located in the network, and considering the amount of nodes' input and output, the new algorithm, has tended to identify destructive nodes. The proposed method in comparison to similar methods is much more efficient and less complex. The structure of this algorithm has the capability to be implemented in a parallel way within several processors.
References:
[1]. S. Makki, N. Pissinou, and H. Huang: The Security issues in the ad-hoc on demand distance vector routing protocol (AODV), pp. 427-432, International Conference on Security and Management (SAM’04), 2004.
[2]. N. Komninos, D.Vergados, and C. Douligeris: Detecting Unauthorized and Compromised Nodes in Mobile Ad-Hoc Networks, pp. 289-298, Journal in Ad Hoc Networks, Elsevier, 2007.
[3]. C.E. Perkins, and S. Das: Ad hoc on-demand distance vector (AODV) routing, IETF Internet Draft, MANET working group, 2004.
[4]. G.Manel, N.Zapata, and N. Asokan: Securing Ad-hoc Routing Protocol, ACM Workshop on Wireless Security, 2002.
[5]. D. Ian, and M. Elizabeth, AODV Routing Protocol Implementation Design, International Conference on Distributed Computing Systems Workshops (ICDCSW’04), 2004.
[6]. su.Ming-Yang: Prevention of Selective Black Hole Attacks on Mobile ad Hoc Networks Through Intrusion Detection Systems, Elsevier, 2010.
[7]. A.Y. Fantahun, and X.Z. Cheng, Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection. International Conference on Future Computer and Communication, 2010.
[8]. G. Ermanno, M. Giacomo, C. Girolamo, M. Agatino, and B. Ferdinando: A Black-hole Resilient Ad-hoc on demand distance Vector Outing for Tactical Communications, BRAVO, IEEE International Black Sea Conference on Communications and Networking (Black Sea Com), 2014.
Article Title: A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET
Author(s): SAIED, Jafarian; MEHDI, Sadeghzadeh
Date of Publication: 2015-06-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2015.01.04
Issue: Volume 4, Issue 1, Year 2015
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 27-32 (6 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.