CFP last date
20 December 2024
Reseach Article

Advanced Algorithm for Detection and Prevention of Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks

by Shalini Jain, Mohit Jain, Himanshu Kandwal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 7
Year of Publication: 2010
Authors: Shalini Jain, Mohit Jain, Himanshu Kandwal
10.5120/165-290

Shalini Jain, Mohit Jain, Himanshu Kandwal . Advanced Algorithm for Detection and Prevention of Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks. International Journal of Computer Applications. 1, 7 ( February 2010), 37-42. DOI=10.5120/165-290

@article{ 10.5120/165-290,
author = { Shalini Jain, Mohit Jain, Himanshu Kandwal },
title = { Advanced Algorithm for Detection and Prevention of Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 7 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number7/165-290/ },
doi = { 10.5120/165-290 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:44:56.271835+05:30
%A Shalini Jain
%A Mohit Jain
%A Himanshu Kandwal
%T Advanced Algorithm for Detection and Prevention of Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 7
%P 37-42
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we propose an algorithm to detect a chain of cooperative malicious node in ad-hoc network that disrupts transmission of data by feeding wrong routing information along with the detection algorithm. We also propose a mechanism to detect and remove the black and gray hole attacks. Our technique is based on sending data in terms of equal but small sized blocks instead of sending whole of data in one continuous stream. The flow of message is monitored independently at the neighborhood of both source and destination. The result of monitoring is gathered by a backbone network of trusted nodes. Our algorithm takes O(n) time on average to find the chain of malicious nodes which is better than earlier O(n2) time bound for detecting a single black hole network.

References
  1. “Security Issues in Mobile Ad Hoc Networks- A Survey” Wenjia Li and Anupam Joshi, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County.
  2. Wireless/Mobile Network Security, Y. Xiao, X. Shen, and D.-Z. Du (Eds.) pp. 170 – 196,2006 Springer, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks” Tiranuch Anantvalee.
  3. S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Proceedings of the 6th annual international conference on Mobile Computing and Networking (MOBICOM), Boston, Massachusetts, United States, 2000, 255-265.
  4. H. Yang, J. Shu, X. Meng, and S. Lu, “SCAN: Selforganized network-layer security in mobile ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 24, issue 2, pp. 261-273, February 2006.
  5. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard. Prevention of cooperative black hole attack in wireless ad hoc networks. In Proceedings of 2003 International Conference on Wireless Networks (ICWN’03), pages 570–575. Las Vegas, Nevada, USA, 2003.
  6. Oscar F. Gonzalez, Michael Howarth, and George Pavlou, Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks Center for Communications Systems Research, University of Surrey, Guildford, UK. Integrated Network Management, 2007. IM '07. 10th IFIP/IEEE International Symposium on May 21, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Packet forwarding misbehavior Mobile ad-hoc network Gray hole attack Black hole attack