A SURVEY ON BLACKHOLE ATTACK IN MANET
Jitendrakumar G Shewaramani*, Vishal A Kanjariya
A Mobile Adhoc network (MANET) is an infrastructure less network comprising of mobile devices, which have capability of dynamically arranging themselves to form a temporary network. Because of mobility of nodes, restricted resources and decentralized administration they become susceptible to various attacks. Nodes participating in MANET have very limited transmission range and so each node in MANET acts as a Router for forwarding packets to other nodes. Hence, secure routing in MANET is the most common research interest. In this paper, we will survey several Denial of Service (DoS) attacks which are serious threats for MANETs namely Blackhole Attack, Wormhole Attack and Grayhole Attack.
Jitendrakumar G Shewaramani
MANET, Security, DoS Attack, Blackhole Attack
A Black Hole attack is one of the most severe security problems in MANET. Here, a malicious node imitates to be a destination node by sending fake RREP to a Source Node that initiates route discovery, and consequently deprives data traffic from the SN. In this paper, several solutions for MANET against Black are presented.
1. M. Ilyas , “The Handbook of Adhoc Wireless Networks”, CRC Press, 2003.
2. Brian P. Crow, Indra Widjaja, Jeon Geun Kim and Preskott T. Sakai, “IEEE 802.11 Wireless Local Area Network”, IEEE Communication Magazine, Vol. 35, No. 9, pp 116-126, September 1997.
3. C.K. Toh, “Ad hoc Mobile Wireless Network: Protocols and Systems”, Prentice Hall Englewood Cliff, NJ 07632, 2002.
4. Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K., “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”. International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003.
5. Burbank JL, Chimento PF, Haberman BK, Kasch WT (2009) Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology.IEEE Communication Magazine 44(11):39–45. doi: 10.1109/COM-M.2006.248156.
6. Asad Amir Pirzada and Chris McDonald, “Secure Routing with the AODV Protocol”, Asia-Pacific IEEE Conference on Communications, Perth, Western Australia, 3 - 5 October 2005.
7. Rajesh Yerneni, Anil K. Sarje, “Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc Networks”, IEEE 2012
8. K.A. Jalil, Z. Ahmad and J. A. Manan “Securing Routing Table Update in AODV Routing Protocol”, IEEE Conference, Sept 25-28, 2011
9. Anu Bala, Munish Bansal and Jagpreet Singh, “Performance Analysis of MANET under Blackhole Attack”, First International Conference on Networks & Communications, 2009, pp. 141-145
10. Weerasinghe H, Fu H., “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, Future Generation Communication and Networking, Jeju-Island, Korea, 6-8 December 2007.
11. Raj PN, Swadas PB, “DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET.” International Journal of Computer Science Issues, Vol.2, 2009.
12. Davide Cerri, Alessandro Ghioni, “Securing AODV: The A-SAODV Secure Routing Prototype”, Communications Magazine, IEEE, Vol.-46, Issue. 2, pp. 120-125, February 2008
13. Chatchik Bisdkian, “An overview of Bluetooth Wireless technology”, IEEE Communication Magazine, Vol. 39, No. 12, pp 86-94, December 2001.
14. C. Murthy and B. Manoj, “Adhoc Wireless Networks: Architectures and Protocols,” Prentice Hall PTR, 2005.
15. Suman Deswal and Sukhbir Singh, “Implementation of Routing Security Aspects in AODV”, IEEE 2010.
16. Hongmei Deng, Wei Li, and Dharma P. Agrawal, Routing security in ad hoc wireless networks, IEEE Comm Magazine, October 2002 vol. 40, pp 70-75.
17. Dokurer, Semih.”Simulation of Black hole attack in wireless Ad-hoc networks”. Master's thesis, Atılım University, September 2006.
18. Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar and Bhavin I. Shah, "MANET Routing Protocols and Wormhole Attack against AODV".
19. Gao Xiaopeng and Chen Wei, “A Novel Grayhole Attack Detection Scheme for Mobile Ad-hoc Networks”, 2007 IFIP International Conference on Network and Parallel Computing – Workshops, 2007, pp. 209-214.
|Download Full Article, Click here|