Open Access Open Access  Restricted Access Subscription or Fee Access

HBRA- Hedge Way for Black Hole Attack in Mobile Ad-Hoc Networks

M. Lalli, P. Mohana, V. Balasubramanian

Abstract


Security is the essential requirement in wireless ad-hoc networks to provide the protected communication between the nodes. The fact that the mobile ad-hoc networks are the lack of fixed infrastructure and use the wireless links for communications to make them very susceptible to an adversary‟s malicious attacks. Due to this feature of freedom and unconstrained mobility, it is prone to many security related problems. One of the problem in ad-hoc network is a black hole attack and it is easily employed by exploiting vulnerability of ad-hoc networks. In black hole attack, the attacker‟s node will always have the availability in replying to the route request and thus intercept the data packet and then retain it. In this paper, we address the problem of packet forwarding misbehavior and present a new technique HBR to detect and remove the black hole attack using NBT(Next Bounds Table), RQCT (Request connection table) and RSCT (Response connection table) Tables. This technique gives the better solution to improve the overall performance of the network and isolates the black hole attack from the network. And also it identifies the correct path to transmit the data packets safely.

Keywords


Ad-Hoc, Black Hole Attack, Routing Packets, Security

Full Text:

PDF

References


Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,” Sixth Annual International Conference on Mobile Computing and Networking, Boston, August 6-11, 2000.

P. Yi, Z. Dai, S. Zhang, and Y. Zhong, “A new routing attack in mobile ad-hoc networks,” Sixth Annual International Conference on Mobile

Computing and Networking (MobiCom‟2000), Boston, August 6-11, 2000.

E. A. Mary Anita and V. Vasudevan, “Black Hole attack on multicast routing protocols”, JCIT, Vol.4, No.2, pp. 64–68, 2009.

Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and endall Nygard,” Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”

H. Deng, W. Li, and Dharma P. Agrawal, “Routing Security in Ad Hoc Networks”, IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol. 40, No. 10, October 2002, pp. 70-75.

Al-Shurman, M. Yoo, S. Park, “Black hole attack in Mobile Ad Hoc Networks”, ACM Southeast Regional Conference, 2004, pp. 96-97.

Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000), “Mitigating routing misbehavior in mobile ad-hoc networks”, Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), ISBN 1-58113- 197-6, pp. 255-265.

S. Buchegger, C. Tissieres, and J. Y. Le Boudec. A test bed for misbehavior detection in mobile ad-hoc networks –how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003.

P. Michiardi and R. Molva. “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”. In Proceedings of the 6th IFIP Communications and Multimedia Security Conference, pages 107–121, Portorosz, Slovenia, September 2002.

A. Patcha and A. Mishra, “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks”, Radio and Wireless Conference, 2003. RAWCON ‟03, Proceedings, pp. 75-78, 10-13 Aug. 2003.

S. Bansal and M. Baker. “Observation-based cooperation enforcement in ad hoc networks”, July 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.