A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks

被引:0
作者
Ahmed, Firoz [1 ]
Yoon, Seokhoon [1 ]
Oh, Hoon [1 ]
机构
[1] Univ Ulsan, Sch Elect Engn, Ulsan 680749, South Korea
关键词
AODV; security; black hole attack; encryption; mobile ad hoc networks; PROTOCOL;
D O I
10.1587/transcom.E98.B.422
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In mobile ad hoc networks, a malicious node can respond with a faked route reply (RREP) message to a source that explores a route in order to make the source establish a false route leading to the malicious node. Then, the malicious node can absorb all transmitted packets like a black hole. This paper proposes a totally secure defense against the black hole attack with low control overhead and high reliability. The proposed approach, named a bullet-proof verification (BPV) method, consists of a detection phase, in which a node detects a suspicious node by analyzing the data routing information of its neighbors and a verification phase, in which a node initiates the verification of a suspicious node conditionally only if it receives RREP from the suspicious node. The crux of this approach lies in using an encrypted verification message that goes straight to the destination through the path that may include some malicious nodes and also in using both destination sequence number and hop distance for verification. In addition, a distributed watchdog mechanism is employed to track down any malicious nodes. Simulation results show that the BPV approach reduces control overhead significantly and defends against black hole attack reliably.
引用
收藏
页码:422 / 436
页数:15
相关论文
共 25 条
[1]  
Ahmed Firoz, 2012, Advances in Grid and Pervasive Computing. Proceedings 7th International Conference, GPC 2012, P312, DOI 10.1007/978-3-642-30767-6_27
[2]  
Ahmed F., 2011, P 8 INT C UB INT COM, P435
[3]  
Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
[4]  
[Anonymous], 2005, CRYPTOGRAPHY NETWORK, VFourth
[5]   Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks [J].
Bhargava, Bharat ;
de Oliveira, Ruy ;
Zhang, Yu ;
Idika, Nwokedi C. .
ICDCS: 2009 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2009, :447-450
[6]  
Bo Sun, 2003, 5th European Personal Mobile Communications Conference 2003 (IEE Conf. Publ. 492), P490, DOI 10.1049/cp:20030303
[7]   Routing security in wireless ad hoc networks [J].
Deng, HM ;
Li, W ;
Agrawal, DP .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) :70-75
[8]   Performance analysis of ad-hoc networks under black hole attacks [J].
Dokurer, Semih ;
Erten, Y. M. ;
Acar, Can Erkin .
PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, :148-153
[9]  
Gillani Saira, 2013, Communication Technologies for Vehicles. 5th International Workshop, Nets4Cars/Nets4Trains 2013. Proceedings, P59, DOI 10.1007/978-3-642-37974-1_5
[10]   A transform domain-based anomaly detection approach to network-wide traffic [J].
Jiang, Dingde ;
Xu, Zhengzheng ;
Zhang, Peng ;
Zhu, Ting .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 40 :292-306