A new efficient approach for detecting single and multiple black hole attacks

被引:3
|
作者
Khalladi, Rachid [1 ]
Rebbah, Mohammed [1 ]
Smail, Omar [1 ]
机构
[1] Univ Mustapha Stambouli Mascara, Comp Sci Dept, Mascara, Algeria
关键词
MANET; AODV; Black hole; Malicious nodes; Multiple attacks; SPlitted AACK; INTRUSION-DETECTION SYSTEM;
D O I
10.1007/s11227-020-03596-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc NETworks (MANET) are networks without infrastructure. The communication range among nodes is limited, where several hops are needed to transmit a packet from the source to the destination. These networks have a constantly changing topology due to its mobile nodes and their arbitrary connections, which make it vulnerable for different attacks. One of the most important attacks in MANET is the black hole attack which degrades the performance of the network by removing all the packets passing through it. There are several techniques for detecting black hole attacks in the ad hoc on demand vector protocol. In this paper, a new approach based on AACK is proposed. The proposed system is to detect the single and multiple black hole attacks by intrusion detection system with SPlitted AACK technique. The system is robust enough to detect all black hole attacks by using an iterative split of the main path until the detection of the malicious nodes. Network simulator 2 is used for simulation. We tested our system on different networks with different network sizes and different numbers of attacks, and we compared our results with some existing intrusion detection system techniques.
引用
收藏
页码:7718 / 7736
页数:19
相关论文
共 50 条
  • [31] Black Hole Attacks Analysis for AODV and AOMDV Routing Performance in VANETs
    Afdhal, Afdhal
    Muchallil, Sayed
    Walidainy, Hubbul
    Yuhardian, Qodri
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICELTICS), 2017, : 29 - 34
  • [32] EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs
    Taher Delkesh
    Mohammad Ali Jabraeil Jamali
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 1897 - 1914
  • [33] An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET
    Ali Dorri
    Wireless Networks, 2017, 23 : 1767 - 1778
  • [34] Detecting and Eliminating Black Hole in AODV Routing
    Nyo, Htoo Maung
    Viriyaphol, Piboonlit
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [35] An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET
    Dorri, Ali
    WIRELESS NETWORKS, 2017, 23 (06) : 1767 - 1778
  • [36] Detection and Prevention of Black Hole Attacks in IOT & WSN
    Ali, Shoukat
    Khan, Muazzam A.
    Ahmad, Jawad
    Malik, Asad W.
    Rehman, Anis Ur
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 217 - 226
  • [37] Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles
    Hassan, Zohaib
    Mehmood, Amjad
    Maple, Carsten
    Khan, Muhammad Altaf
    Aldegheishem, Abdulaziz
    IEEE ACCESS, 2020, 8 (08): : 199618 - 199628
  • [38] A new approach toward geometrical concept of black hole thermodynamics
    Seyed Hossein Hendi
    Shahram Panahiyan
    Behzad Eslam Panah
    Mehrab Momennia
    The European Physical Journal C, 2015, 75
  • [39] Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network
    Rathee, Geetanjali
    Saini, Hemraj
    PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2015, VOL 2, 2016, 439 : 383 - 392
  • [40] Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks
    Ahmed, Mozmin
    Hussain, Md. Anwar
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND INSTRUMENTATION (ICECI), 2014,