A Review of Security Techniques against Black hole Attacks in Mobile Ad hoc Networks

被引:5
|
作者
Mwangi, Ephantus Gichuki [1 ]
Muketha, Geoffrey Muchiri [2 ]
Ndungu, Gabriel Kamau [2 ]
机构
[1] Kirinyaga Univ, POB 43-10300, Kerugoya, Kenya
[2] Muranga Univ Technol, POB 75-10200, Muranga, Kenya
关键词
Mobile Ad hoc Networks; Security Technique; Routing protocol; Route Request; Cooperative black hole attack;
D O I
10.23919/istafrica.2019.8764862
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Mobile ad hoc network (MANET) is a special type of a wireless network formed by nodes that communicate without any fixed infrastructure or centralised management. Nodes in MANET act as a router and a host. These nodes are free to join and leave the network. Routes are established by use of special routing protocols. Mobility of nodes makes the network topology dynamic at any given time. These unique features together with unsecured boundaries make the security of MANETs a challenging endeavor. MANETs are prone to attacks such black hole among others. Sometimes the black hole nodes cooperate forming cooperative black hole attack that drop or redirecting data packets. This paper reviews various security techniques and routing protocols against black hole attacks and establishes their limitations. The identified knowledge gaps will be used as a foundation for the development of a resilient security technique against collaborative black hole attacks.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Minimising Black Hole Attacks to Enhance Security in Wireless Mobile Ad Hoc Networks
    Chengetanai, Gibson
    2018 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2018,
  • [2] A survey of black hole attacks in wireless mobile ad hoc networks
    Tseng, Fan-Hsun
    Chou, Li-Der
    Chao, Han-Chieh
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2011, 1 : 1 - 16
  • [3] Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks
    Farooq, Muhammad Umar
    Wang, Xingfu
    Sajjad, Moizza
    Qaisar, Sara
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (03): : 1330 - 1347
  • [4] Interception of Black- Hole Attacks in Mobile AD-HOC Networks
    Balachandra
    Shetty, Nisha P.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 5 - 9
  • [5] Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks
    Venu, Vasantha Sandhya
    Avula, Damodaram
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (06)
  • [6] Security methods against Black Hole attacks in Vehicular Ad-Hoc Network
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2020,
  • [7] A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks
    Ahmed, Firoz
    Yoon, Seokhoon
    Oh, Hoon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (03) : 422 - 436
  • [8] Bait Request Algorithm to Mitigate Black Hole Attacks in Mobile Ad Hoc Networks
    Kolade, Ayanwuyi T.
    Zuhairi, Megat F.
    Dao, Hassan
    Khan, Sohail
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (05): : 56 - 62
  • [9] Detection and Prevention of single and Cooperative Black Hole attacks in Mobile ad Hoc Networks
    Subathra, P.
    Sivagurunathan, S.
    Ramaraj, N.
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2010, 6 (01) : 38 - 57
  • [10] Collaborative security architecture for black hole attack prevention in mobile ad hoc networks
    Patcha, A
    Mishra, A
    BOSTON 2003 RADIO & WIRELESS RAWCON CONFERENCE, PROCEEDINGS, 2003, : 75 - 78