A Survey to Monitor and Defend Against Blackhole Attacks in Mobile Adhoc Networks

  • Authors

    • M Thebiga
    • R Suji Pramila
    2018-07-04
    https://doi.org/10.14419/ijet.v7i3.6.15127
  • Mobile adhoc networks, infrastructure-less, packet dropping, black hole attack, malicious node
  • Abstract

    Mobile adhoc networks is defined as collection of infrastructure less, self-organized, dynamic networks of mobile nodes that can be connected anywhere and at any time. In Mobile Adhoc Networks, every node in the network habitually amalgamate and deliver every other nodes packets in a sequence to permit out of reach conveyance. In this aggressive background, a part of the nodes may opposed to have it, either for preserving their self-resources or deliberately distorting usual conveyance. This class of misconduct is cited as packet dropping attack or Black hole attack. This kind of attack is supposed to be more catastrophic attack and it may provide a route to network crumble. The black hole malicious node organize its malevolent performance during the route locating procedures. In this paper we make a compendious study and survey examination on the counteract ant to be concerned with black hole attack and also we explore some of the propounded solution to diagnose and to avert the attack.

     

  • References

    1. [1] Panos C, Ntantogian C, Malliaros S & Xenakis C, “Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networksâ€, Computer Networks, Vol.113, (2017), pp.94-110.

      [2] Zhang XM, “Interference Based topology control algorithm for delay constrained mobile Adhoc Networksâ€, IEEE Transaction on Mobile Computing, Vol.14, (2015), pp.742-754.

      [3] Shu T & Krunz M, “Privacy Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Adhoc Networksâ€, IEEE Transactions on Mobile Computing, Vol.14, No.4, (2015), pp.813-828.

      [4] Siddiqua A, Sridevi K & Khan AA, “Preventing Black-hole attack s in Manets using Secured Algorithmâ€, International conference on IEEE Signal Processing and Communication Engineering Systems (SPACES), (2015).

      [5] Kumari V & Paramasivan B, “Defense against Sybil Attacks and authentication for anonymous location based routing in MANETâ€, Wireless Network Journal, Springer, (2016).

      [6] Weerasinghe H & Fu H, “Preventing Cooperative Black hole Attacks in Mobile Adhoc Networks: Simulation Implementation and Evaluationâ€, International Journal of Software Engineering and its Application, Vol.2, No.3, (2008).

      [7] Baadache A & Belmehdi A, “Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networksâ€, Computer Networks, Vol.73, (2014), pp.173-184.

      [8] Kumar J, Kulkarni M & Gupta D, “Effect of Black hole Attack on MANET routing protocolsâ€, International Journal of Computer Network and Information Security, Vol.5, No.5,(2013), p.64-72.

      [9] Anantvalee T & Wu J, “A survey on intrusion detection in mobile ad hoc networksâ€, Wireless Network Security, (2007), pp.159-180.

      [10] Hu Y & Perrig A, “A Survey of Secure Wireless Adhoc Routingâ€, IEEE Security & Privacy, Vol.2, No.3,(2004), pp.28-39.

      [11] Djenouri D, Khelladi L & Badache N, “A Survey of Security Issues in Mobile Adhoc and Sensor Networksâ€, IEEE Commun.Surveys & Tutorials, Vol.7, No.4, (2005).

      [12] Gurung S & Chauhan S, “A Dynamic Threshold Based Approach for Mitigating Black-Hole Attack in MANETâ€, Wireless Networks, Springer, (2017).

      [13] Tan SS, Li XP & Dong QK, “Trust Based Routing Mechanism for securing OSLR-based MANETâ€, Adhoc Networks, Vol.30, (2015), pp.84-98.

      [14] Basile C, Kalbarczyk Z & Iyer RK, “Inner Circle Consistency for Wireless Adhoc Networksâ€, IEEE Trans.Mobile.Computing, Vol.6, No.1, (2007), pp.39-55.

      [15] Liu K, Deng J, Varshney PK & Bala Krishnan K, “An Acknowledgement–Based Approach for the Detection of Routing Misbehaviour in Manetsâ€, IEEE Transactions on Mobile Computing, Vol.6, No.5, (2007), pp.536-550.

      [16] Mistry N & Jinwala Z, “Improving AODV Protocol against Black Hole Attacksâ€, International Multi conference of Engineers and Computer Scientists IMECS Hong Kong, (2010).

      [17] Dr.Tamilarasan, “Securing AODV Routing Protocol from Black Hole Attackâ€, International Journal of Computer Science and Telecommunications, Vol.3, No.7, (2012).

      [18] Osathanunkul K & Zhang N, “A countermeasure to black hole attacks in mobile ad hoc networksâ€, IEEE International Conference on Networking, Sensing and Control, (2011), pp.508-513.

      [19] Herminder Singh S, “An Approach for the Detection and Removal of Black hole Attack in MANETSâ€, International Journal of Research in IT and Management ,Vol.1, No.2, (2011).

      [20] Jain A & Shrotriya A, “Investigating the Effects of Black Hole Attack in MANET under Shadowing Model with Different Traffic Conditionsâ€, International Conference on Computer, Communication and Control, (2015), pp.1-6.

      [21] Jamali SBS, “A Survey over Black hole attack Detection in Mobile Adhoc Networksâ€, International Journal of Computer Science and Network Security, (2015).

      [22] Su MY, “Prevention of Selective Black hole Attacks on Mobile Adhoc Networks through Intrusion Detection Systemsâ€, Computer Communications, (2011), pp.107-117.

      [23] Khemariya N & Khuntetha A, “An Efficient Algorithm for Detection of black hole Attack in AODV Based Manetsâ€, International Journal of Computer Applications, Vol.66, No.18, (2013), pp.18-24.

      [24] Singh S, Mishra A & Singh U, “Detecting and Avoiding of Black hole Attack on MANET using Trusted AODV Routing Algorithmâ€, IEEE Symposium on Colossal Data Analysis and Networking, (2016), pp.1-6.

      [25] Chang JM, Tsou PC, Woungang I, Chao HC & Lai CF, “Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approachâ€, IEEE Systems Journal, Vol.9, No.1, (2015),pp.65-75.

      [26] Khan MS, Midi D, Khan MI & Bertino E, “Fine-Grained Analysis of Packet Loss in MANETsâ€, IEEE Access, Vol.5, (2017), pp.7798-7807.

      [27] Sharma R, “Grey Hole Attack in Mobile Adhoc Networks: A Surveyâ€, International Journal of Computer Science and Information Technologies, Vol.7, No.3, (2016), pp.1457-1460.

      [28] Borkar GM & Mahajan AR, “A Secure and Trust based on-Demand Multipath Routing Scheme for Self-Organized Mobile Adhoc Networks Wireless Networkâ€, The Journal of Mobile Communication, Computation and Information, (2016).

      [29] Shukla PD, Kanthe AM & Simunic D, “An Analytical Approach For Detection of Gray Hole Attack in Mobile Adhoc Networks (MANET)â€, IEEE International Conference on Computational Intelligence and Computing Research, (2014), pp.1-5.

      [30] Ahmed M and Hussain Md.A, “Performance of IDS in an Adhoc Network under Black Hole and Gray Hole Attacksâ€, IEEE International Conference on Electronics, Communication and Instrumentation, (2014), pp.1-4.

      [31] Usha G & Bose S, “Impact of Gray Hole Attack on Adhoc Networksâ€, IEEE International conference on Information, Communication and Embedded Systems, (2013).

      [32] Rajesh Babu M & Usha G, “A Novel Honey Pot Based Detection and Isolation Approach(NHBADI)To Detect and Isolate Black hole Attacks in MANETâ€, An International Journal of Wireless Personal Communications, Vol.90, (2016), pp.831-845.

      [33] Panos C, Xenakis C, Kotzias P & Stavrakakis I, “A Specification Based Intrusion Detection Engine for Infrastructure-less networksâ€, Computer Communication journal, Vol.54, (2014), pp.67-83.

      [34] Barkhodia E, Parulpreet S & Walia GK, “Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANETâ€, International Journal of Computer Science Engineering, (2012).

      [35] Proano A & Lazos L, “Packet-Hiding Methods for Preventing Selective Jamming Attacksâ€, IEEE Transaction on Dependable Secure Computing, Vol.9, No.1, (2012), pp.101-114.

      [36] Zhang Y, Lazos L & Kozma W, “AMD: Audit- Based misbehaviour Detection in Wireless Networksâ€, IEEE Transaction on Mobile Computing, (2013).

      [37] MohanaPriya M & Krishnamurthi I, “Modified DSR Protocol for Detection and Removal of Selective Black hole Attack in MANETâ€, Computers and Electrical Engineering Journal, Elsevier, (2014), pp.530-538.

      [38] Shabut AM, Dahal KP, Bista SK & Awan IU, “Recommendation Based Trust Model with an Effective Defence Scheme for Manetsâ€, IEEE Transaction on Mobile Computing, Vol.14, (2015), pp.2101-2115.

      [39] Shakshuki EM, Kang N & Sheltami TR, “EAACK-A secure intrusion detection system for MANETSâ€, IEEE Transaction on Industrial Electronics, Vol.60, (2013), pp.1089-1098.

      [40] Pham TND & Yeo CK, “Detecting colluding blackhole and greyhole attacks in delay tolerant networksâ€, IEEE Transactions on Mobile Computing, Vol.15, No.5,(2016), pp.1116-1129.

      [41] Murthy SR & Manoj BS, Adhoc Wireless Networks: Architecture and Protocols, Prentice Hall Professional Technical reference, 2004.

  • Downloads

  • How to Cite

    Thebiga, M., & Suji Pramila, R. (2018). A Survey to Monitor and Defend Against Blackhole Attacks in Mobile Adhoc Networks. International Journal of Engineering & Technology, 7(3.6), 337-342. https://doi.org/10.14419/ijet.v7i3.6.15127

    Received date: 2018-07-05

    Accepted date: 2018-07-05

    Published date: 2018-07-04