DOI QR코드

DOI QR Code

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong (School of Electronic Engineering, Beijing University of Posts and Telecommunications) ;
  • Yi, Ping (School of Information Security Engineering, Shanghai Jiao Tong University) ;
  • Wang, Junfeng (College of Computer Science, Sichuan University) ;
  • Yang, Hongshen (Department of Electrical Engineering, Tongling University)
  • Received : 2013.03.25
  • Accepted : 2013.06.22
  • Published : 2013.07.31

Abstract

Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.

Keywords

References

  1. H.Nishiyama, T.Ngo, N. Ansari, N.Kato, "On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks," IEEE Transactions on Wireless Communications, Vol.11, No.3, pp. 1158 - 1166, 2012. https://doi.org/10.1109/TWC.2012.010312.110783
  2. Yingbin Liang, Poor, H.V., Lei Ying, "Secrecy Throughput of MANETs Under Passive and Active Attacks," IEEE Transactions on Information Theory, Vol.57, No.10, pp. 6692 - 6702, 2011.
  3. Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu, "Risk-Aware Mitigation for MANET Routing Attacks," IEEE Transactions on Dependable and Secure Computing, Vol.9, No.2, pp. 250 - 260, 2012. https://doi.org/10.1109/TDSC.2011.51
  4. Deng, H., Li, W., & Agrawal, D., "Routing Security in Wireless Ah Hoc Networks," IEEE Communications Magazine, Vol.40, No.10, pp.70 - 75, 2002.
  5. Johnson DB, Maltz DA, Broch J., "DSR: The dynamic source routing protocol for multiple wireless ad hoc networks," Ad Hoc Networking. Addison-Wesley, pp.139-172, 2001.
  6. Cai, J.W., Yi, P., Tian, Y., Zhou Y.K., Liu N., "The Simulation and Comparison of Routing Attacks on DSR Protocol," in Proc. of 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009 (WiCom '09), Beijing, China, September, 2009.
  7. Bo Sun; Yong Guan, Jian Chen, Pooch U.W., "Detecting Black-hole Attack in Mobile Ad Hoc Networks," in Proc. of 5th European Personal Mobile Communications Conference, pp.490-495, 2003.
  8. Patcha, A., Mishra, A., "Collaborative security architecture for black hole attack prevention in mobile ad hoc networks," Radio and Wireless Conference, pp.75-78, 2003.
  9. Gao Xiaopeng, Chen Wei, "A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks," in Proc. of IFIP International Conference on Network and Parallel Computing Workshops, pp.209-214, 2007.
  10. D. Boneh, C. Gentry, B. Lynn, H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Advances in Cryptology-EUROCRYPT'03: LNCS 2656. Berlin: Springer-Veralg, pp.416-432, 2003.
  11. Shila, D.M., Anjali, T., "Defending selective forwarding attacks in WMNs," in Proc. of IEEE International Conference on Electro/Information Technology, pp.96-101, 2008.
  12. Akyildiz, I. F., & Wang, X., "A Survey on Wireless Mesh Networks," IEEE Communications Magazine, Vol.43, No. 9, pp.23-30, 2005. https://doi.org/10.1109/MCOM.2005.1509968
  13. D.S J De Couto, D.Aguayo, J.Bicket, and R.Morris, "A High-Throughput Path Metric for Multi-Hop Wireless routing," in Proc. of ACM International Conference on Mobile Computing and Networking (ACM Mobicom2003), 2003.
  14. Kevin Fall and Kannan Varadhan, NS notes and documentation, The VINT Project, UC Berkely, LBL, USC/ISI, and Xerox PARC, 1997.
  15. J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proc. of ACM International Conference on Mobile Computing and Networking (ACM Mobicom1998), 1998.
  16. M. Just, E. Kranakis, and T. Wan, "Resisting Malicious Packet Dropping In Wireless Ad Hoc Networks," International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW2003), Oct. 2003.

Cited by

  1. Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET vol.23, pp.7, 2013, https://doi.org/10.1007/s11276-016-1284-1