Open Access Open Access  Restricted Access Subscription or Fee Access

Removal of Malicious Nodes Launching Blackhole Attack in MANETs

V. Ramya, S. Mylsamy

Abstract


Mobile Adhoc Network (MANET) have been widely used for various applications such as military crisis operations and emergency rescue operations. The infrastructure-less nature and the dynamic topology features of MANET makes these networks highly vulnerable to various security issues .The primary requirement for the establishment of communication among nodes in mobile ad hoc networks is that nodes should cooperate with each other. With the existence of malevolent nodes, this requirement may lead to serious security concerns; for example, such malicious nodes may disrupt the routing process. In this context, preventing or detecting malicious nodes launching collaborative blackhole attacks is a challenge. This paper resolves this issue by designing a routing mechanism based on dynamic source routing (DSR) , referred to as the cooperative bait detection scheme (CBDS). In this scheme, it integrates the proactive and reactive defense architecture and randomly cooperates with a stochastic adjacent node. By using the address of an adjacent node as a bait destination address to bait malicious nodes to send a reply message (RREP) and strange nodes are detected using a reverse tracing technique thereby ensures security. Simulation results are provided, showing that in the presence of malicious node attacks, the CBDS outperforms the DSR protocol in terms of performance metrics such as throughput and packet delivery ratio.


Keywords


Dynamic Source Routing (DSR), Collaborative Blackhole Attacks, Malicious Node, Cooperative Bait Detection Scheme (CBDS), Collaborative Bait Detection, Detection Mechanism, Grayhole Attacks, Mobile Ad Hoc Network (MANET).

Full Text:

PDF

References


P.-C. Tsou, J.-M. Chang, H.-C. Chao, and J.-L. Chen, “CBDS: A coopera-tive bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture,” in Proc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, Feb. 28–Mar., 03, 2011, pp. 1–5.

S. Corson and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Consid-erations, Jan. 1999. (Last retrieved March 18, 2013). [Online]. Available: http://www.elook.org/computing/rfc/rfc2501.html

C. Chang, Y. Wang, and H. Chao, “An efficient Mesh-based core multicast routing protocol on MANETs,” J. Internet Technol., vol. 8, no. 2, pp. 229– 239, Apr. 2007.

D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Comput., pp. 153–181, 1996.

I. Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero, “TBONE: A mobile-backbone protocol for ad hoc wireless networks,” in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp. 2727–2740.

A. Baadache and A. Belmehdi, “Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks,” Intl. J. Comput. Sci. Inf. Security, vol. 7, no. 1, 2010.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehav-ior in mobile ad hoc networks,” in Proc. 6th Annu. Intl. Conf. MobiCom, 2000, pp. 255–265.

K. Vishnu and A. J Paul, “Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks,” Int. J. Comput. Appl., vol. 1, no. 22, pp. 28–32, 2010.

K. Liu, D. Pramod, K. Varshney, and K. Balakrishnan, “An Acknowl-edgement based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.

H. Deng, W. Li, and D. Agrawal, “Routing security in wireless ad hoc network,” IEEE Commun. Mag., vol. 40, no. 10, Oct. 2002.

S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, “Prevention of cooperative blackhole attacks in wireless ad hoc net-works,” in Proc. Int. Conf. Wireless Netw., Jun. 2003, pp. 570–575.

H. Weerasinghe and H. Fu, “Preventing cooperative blackhole attacks in mobile ad hoc networks: Simulation implementation and evaluation,” in Proc. IEEE ICC, 2007, pp. 362–367.

Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad hoc routing service in adversarial environments,” Wireless Pers.Commun., vol. 29, pp. 367– 388, 2004. W. Kozma and L. Lazos, “REAct: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits,” in Proc. WiSec, 2009, pp. 103–110.

W. Wang, B. Bhargava, and M. Linderman, “Defending against collabo-rative packet drop attacks on MANETs,” in Proc. 28th IEEE Int. Symp. Reliable Distrib. Syst., New Delhi, India, Sep. 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.