Detecting Black Hole Attack in Wireless Ad Hoc Networks Based On Learning Automata

被引:0
作者
Soleimani, Mohammad Taqi [1 ]
Ghasemi, Abdorasoul [2 ]
机构
[1] Qazvin Azad Univ, Dept Elect & Comp Engn, Qazvin, Iran
[2] K N Toosi Univ Technol, Dept Elect & Comp Engn, Tehran, Iran
来源
2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT) | 2012年
关键词
Wireless ad hoc network; AODV; Security; Packet dropping; Black hole attack; Learning automata;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless ad hoc networks are vulnerable to several attacks including packet dropping. In this kind of attack, a malicious node tries to absorb network traffic and then drop them to form a denial of service (DOS) attack. Black hole attack is a sort of DOS attack. In this attack, a malicious node advertises itself as having the shortest and freshest path to the destination. Once traffic is redirected to this node, it simply drops them. In this paper, we present a novel solution to detect the black hole attack based on learning automata (LA). By using learning automata in a random environment, nodes can learn and adopt its behaviors based on the received signals from the environment. To the best of our knowledge, our work is the first one that tries to detect black hole attack by using LA. The simulation results in NS2 show that using proposed solution, attack is detected successfully.
引用
收藏
页码:514 / 519
页数:6
相关论文
共 14 条
  • [1] A Survey of Secure Mobile Ad Hoc Routing Protocols
    Abusalah, Loay
    Khokhar, Ashfaq
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04): : 78 - 93
  • [2] Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
  • [3] Bo Sun, 2003, 5th European Personal Mobile Communications Conference 2003 (IEE Conf. Publ. 492), P490, DOI 10.1049/cp:20030303
  • [4] Routing security in wireless ad hoc networks
    Deng, HM
    Li, W
    Agrawal, DP
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 70 - 75
  • [5] On the effect of node misbehavior in ad hoc networks
    Hollick, M
    Schmitt, J
    Seipl, C
    Steinmetz, R
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3759 - 3763
  • [6] Hollick M, 2004, LECT NOTES COMPUT SC, V2957, P201
  • [7] Karlof C, 2003, PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, P113, DOI 10.1109/snpa.2003.1203362
  • [8] Kurosawa S., 2007, International Journal of Network Security, P338
  • [9] Black Hole Attack Prevention Based on Authentication Mechanism
    Luo, Junhai
    Fan, Mingyu
    Ye, Danxia
    [J]. 2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 173 - 177
  • [10] Narendra K. S., 1989, Learning Automata: An Introduction