EDIS: An effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks

被引:0
作者
Jebadurai I.J.R. [1 ]
Rajsingh E.B. [1 ]
Paulraj G.J.L. [1 ]
Silas S. [1 ]
机构
[1] Department of Computer Sciences Technology, Karunya University, Coimbatore
关键词
Ad hoc on-demand distance vector; Attack detection; Destination sequence number; Malicious node; MANET security; Route disruption attack; Route request; Routing; Sinkhole attack;
D O I
10.1504/IJWMC.2016.081161
中图分类号
学科分类号
摘要
Reactive routing protocols in Mobile Ad Hoc Networks (MANETs) such as Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) are vulnerable to sinkhole attack. Sinkhole attack is a route disruption attack. The malicious sinkhole nodes attempt to lure almost all the traffic by propagating false routing information and disrupting the normal operation of the network. The sinkhole nodes should be detected and isolated from the MANET as early as possible. Hence, a consistent, reliable and effective method of detecting sinkhole nodes is required. We have developed a method to detect the sinkhole nodes by observing the behaviour of the mobile nodes in the neighbourhood and isolating them from the MANET. The proposed method was simulated and the experimental analysis was carried out. The results show that the proposed method is consistent, reliable and effective in detecting and isolating the sinkhole nodes in MANET. Copyright © 2016 Inderscience Enterprises Ltd.
引用
收藏
页码:171 / 181
页数:10
相关论文
共 21 条
  • [1] Alem Y.F., Xuan Z.C., Preventing black hole attack in mobile ad-hoc networks using anomaly detection, Proceedings of the 2nd International Conference on Future Computer and Communication (ICFCC), 3, pp. 672-676, (2010)
  • [2] Basile C., Kalbarczyk Z., Iyer R.K., Inner-circle consistency for wireless ad hoc networks, IEEE Transactions on Mobile Computing, 6, 1, pp. 39-55, (2007)
  • [3] Clausen T.H., Hansen G., Christensen L., Behrmann G., The optimized link state routing protocol, evaluation through experiments and simulation, Proceedings of IEEE Symposium on Wireless Personal Mobile Communications, (2001)
  • [4] Das S.R., Perkins C.E., Royer E.M., Performance comparison of two on-demand routing protocols for ad hoc networks, Personal Communications, 8, 1, pp. 16-28, (2001)
  • [5] Deng H., Li W., Agrawal D.P., Routing security in wireless ad hoc networks, IEEE Communications Magazine, 40, 10, pp. 70-75, (2002)
  • [6] Garcia-Teodoro P., Aschenbruck N., A novel collaborative approach for sinkhole detection in MANETs, Ad-hoc Networks and Wireless: ADHOC-NOW 2014 International Workshops, ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN, (2014)
  • [7] Hongsong C., Zhenzhou J., Mingzeng H., Zhongchuan F., Ruixiang J., Design and performance evaluation of a multi-agent-based dynamic life time security scheme for AODV routing protocol, Journal of Network and Computer Applications, 30, 1, pp. 145-166, (2007)
  • [8] Iwata A., Chiang C.C., Pei G., Gerla M., Chen T.W., Scalable routing strategies for ad hoc wireless networks, IEEE Journal on Selected Areas in Communications, 17, 8, pp. 1369-1379, (1999)
  • [9] Jebadurai J., Melvin A., Jebadurai I., Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes, Proceedings of the 3rd International Conference on Electronics Computer Technology (ICECT), 3, pp. 321-324, (2011)
  • [10] Jhonson D.B., Maltz D.A., Dynamic source routing in ad hoc wireless networks, Mobile Computing, 353, pp. 153-181, (1996)