Detection of Black Hole and Worm Whole Attacks in MANETS

International Journal of Mobile Computing and Application
© 2015 by SSRG - IJMCA Journal
Volume 2 Issue 2
Year of Publication : 2015
Authors : Dr.V.Egaiarasu and D.Kailashchandra
pdf
How to Cite?

Dr.V.Egaiarasu and D.Kailashchandra, "Detection of Black Hole and Worm Whole Attacks in MANETS," SSRG International Journal of Mobile Computing and Application, vol. 2,  no. 2, pp. 6-9, 2015. Crossref, https://doi.org/10.14445/23939141/IJMCA-V2I3P104

Abstract:

Mobile Ad-hoc networks (MANET) are gatherings of self-organizing mobile nodes with dynamic topologies and have no static organization. For the reason that there is a dynamic adhoc nature, in which unknown device develops unprompted interactions between themselves, then networks are mostly vulnerable to various security threats. Consequently it is proposed to design and instrument malicious node detection system to avoid black hole and worm hole attacks in MANETs. In this paper we use Cooperative bait detection scheme to detect black hole attacks. To identify Worm hole attack as well we combined Performance Evaluation Multipath Algorithm in CBDS scheme. Worm hole attacks are spotted using hop-count and time delay analysis from the viewpoint of users without any unusual environment assumptions.

Keywords:

CBDS, DSR (Dynamic Source Routing), Reverse Tracing, MANETs, Performance Evaluation Multipath algorithm, Adhoc.

References:

[1] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile ad hoc networks,” in IEEE Wireless Communications, Oct. 2007, pp. 85–91. 
[2] D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Comput., pp. 153–181, 1996. 
[3] Yang H., Luo H., Ye F., Lu S. and Zhang L.: Security in mobile ad hoc networks: challenges and solutions, In IEEE Wireless Communications, vol. 11, no. 1, pp.38–47 (2004). 
[4] Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2003 Packet Leashes: A Defense against Worm hole Attacks in Wireless Networks, Twenty-Second Annual Joint Conference of IEEE Computer and Communications, Volume 3, pp. 1976-1986. 
[5] K. Liu, D. Pramod, K. Varshney, and K. Balakrishnan, “An Acknowl- edgement based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007. 
[6] Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad hoc routing service in adversarial environments,” Wireless Pers.Commun., vol. 29, pp. 367– 388, 2004. 
[7] C. Hongsong, J. Zhenzhou, and H. Mingzeng, “A novel security agent scheme for aodv routing protocol based on thread state transition,” Asia Journal of Information Technology, vol. 5, no. 1, pp. 54–60, 2006. 
[8] Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2003 Packet Leashes: A Defense against Worm hole Attacks in Wireless Networks, Twenty-Second Annual Joint Conference of IEEE Computer and Communications, Volume 3, pp. 1976-1986. 
[9] V. Mahajan, M. Natu, A. Sethi. ,Analysis of worm hole intrusion attacks in MANETS, IEEE Military Communications Conference (MILCOM), pp. 1-7, 2008. 
[10] L. Lazos, R. Poovendram, C. Meadows, P. Syverson, L.W. Chang, Preventing Worm hole Attacks on Wireless Ad Hoc Networks: a Graph Theoretical Approach, IEEE Communication Society, WCNC 2005 
[11] Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai, Member, IEEE. , “Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach”.