Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET

被引:26
作者
Hammamouche, Assia [1 ]
Omar, Mawloud [2 ]
Djebari, Nabil [1 ]
Tari, Abdelkamel [1 ]
机构
[1] Univ Bejaia, Lab Informat Med, Fac Sci Exactes, Bejaia 06000, Algeria
[2] Univ Bejaia, Unite Rech LaMOS, Fac Sci Exactes, Bejaia 06000, Algeria
关键词
Wireless ad hoc network; Routing protocol security; Black hole attack; Trust; Reputation; ROUTING SECURITY; HOC;
D O I
10.1016/j.jisa.2018.10.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc network is a set of mobile nodes interconnected by wireless communication. It is easily and less expensive to deploy, but it is vulnerable against various attacks. The node data should cross a set of intermediate nodes in order to reach the intended destination. An intermediate node, which takes part of the routing process, can behave maliciously and drop the packets passing through it instead of transferring them to its successor, which leads to what is called black hole attack. Several solutions have been proposed in the literature review. However, these solutions suffer from the imbalance between robustness and overhead. In this context, we propose a solution based on reputation of nodes and multi-hop acknowledgment. The reputation of nodes increases or decreases depending on the situation and the observation condition. When the node reputation passes below the threshold, then it will be considered as a black hole node. The proposed approach detects and excludes simple and cooperative black hole attackers and enforces the cooperation among the network nodes. Through simulation, we compare the proposed approach to a concurrent protocol and we show its efficiency in terms of detection ratio and communication overhead. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:12 / 20
页数:9
相关论文
共 26 条
[1]  
Alem Yibeltal Fantahun, 2010, Proceedings of the 2010 2nd International Conference on Future Computer and Communication (ICFCC 2010), P672, DOI 10.1109/ICFCC.2010.5497455
[2]  
[Anonymous], INT J ADV COMPUT SCI
[3]   Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks [J].
Baadache, Abderrahmane ;
Belmehdi, Ali .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :1130-1139
[4]  
Biswas Kamanshis., 2007, Security Threats in Mobile Ad Hoc Network
[5]   Self-policing mobile ad hoc networks by reputation systems [J].
Buchegger, S ;
Le Boudec, JY .
IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (07) :101-107
[6]   Routing security in wireless ad hoc networks [J].
Deng, HM ;
Li, W ;
Agrawal, DP .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) :70-75
[7]   Security in wireless ad-hoc networks - A survey [J].
Di Pietro, R. ;
Guarino, S. ;
Verde, N. V. ;
Domingo-Ferrer, J. .
COMPUTER COMMUNICATIONS, 2014, 51 :1-20
[8]   Struggling against selfishness and black hole attacks in MANETs [J].
Djenouri, Djamel ;
Badache, Nadjib .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (06) :689-704
[9]  
Djenouri D, 2006, LECT NOTES COMPUT SC, V4124, P163
[10]   An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET [J].
Dorri, Ali .
WIRELESS NETWORKS, 2017, 23 (06) :1767-1778