A Review of Security Techniques against Black hole Attacks in Mobile Ad hoc Networks

被引:5
|
作者
Mwangi, Ephantus Gichuki [1 ]
Muketha, Geoffrey Muchiri [2 ]
Ndungu, Gabriel Kamau [2 ]
机构
[1] Kirinyaga Univ, POB 43-10300, Kerugoya, Kenya
[2] Muranga Univ Technol, POB 75-10200, Muranga, Kenya
关键词
Mobile Ad hoc Networks; Security Technique; Routing protocol; Route Request; Cooperative black hole attack;
D O I
10.23919/istafrica.2019.8764862
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Mobile ad hoc network (MANET) is a special type of a wireless network formed by nodes that communicate without any fixed infrastructure or centralised management. Nodes in MANET act as a router and a host. These nodes are free to join and leave the network. Routes are established by use of special routing protocols. Mobility of nodes makes the network topology dynamic at any given time. These unique features together with unsecured boundaries make the security of MANETs a challenging endeavor. MANETs are prone to attacks such black hole among others. Sometimes the black hole nodes cooperate forming cooperative black hole attack that drop or redirecting data packets. This paper reviews various security techniques and routing protocols against black hole attacks and establishes their limitations. The identified knowledge gaps will be used as a foundation for the development of a resilient security technique against collaborative black hole attacks.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] A secure and resistant architecture against attacks for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 150 - 166
  • [32] Clustering of Mobile Ad Hoc Networks: An Approach for Black Hole Prevention
    Sayner, Jitendra
    Gupta, Vinit
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 361 - 365
  • [33] Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
    Chen, Ruiliang
    Snow, Michael
    Park, Jung-Min
    Refaei, M. Tamer
    Eltoweissy, Mohamed
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [34] A Survey of Black Hole Detection Policies in Mobile Ad Hoc Networks
    Bala, Kanchan
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (12): : 295 - 303
  • [35] Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks
    Zhao Min
    Zhou Jiliu
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 26 - +
  • [36] Performance analysis of ad-hoc networks under black hole attacks
    Dokurer, Semih
    Erten, Y. M.
    Acar, Can Erkin
    PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 148 - 153
  • [37] Security in Mobile Ad Hoc Networks
    Khanpara, Pimal
    Trivedi, Bhushan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 501 - 511
  • [38] Security in mobile ad hoc networks
    Carvalho, Marco
    IEEE SECURITY & PRIVACY, 2008, 6 (02) : 72 - 75
  • [39] A survey of Attacks in Mobile Ad hoc Networks
    Meddeb, Rahma
    Triki, Bayrem
    Jemili, Arah
    Korbaa, Ouajdi
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [40] Interlayer attacks in mobile ad hoc networks
    Guang, Lei
    Assi, Chadi
    Benslimane, Abderrahim
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 436 - +