We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Statistical Technique to Mitigate Black Hole Attack in Wireless Network

by K. Mahamuni, C. Chandrasekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 12
Year of Publication: 2012
Authors: K. Mahamuni, C. Chandrasekar
10.5120/9337-3649

K. Mahamuni, C. Chandrasekar . An Statistical Technique to Mitigate Black Hole Attack in Wireless Network. International Journal of Computer Applications. 58, 12 ( November 2012), 33-37. DOI=10.5120/9337-3649

@article{ 10.5120/9337-3649,
author = { K. Mahamuni, C. Chandrasekar },
title = { An Statistical Technique to Mitigate Black Hole Attack in Wireless Network },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 12 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number12/9337-3649/ },
doi = { 10.5120/9337-3649 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:02:21.288530+05:30
%A K. Mahamuni
%A C. Chandrasekar
%T An Statistical Technique to Mitigate Black Hole Attack in Wireless Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 12
%P 33-37
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network nodes function as routers in ad hoc networks forwarding data packets that had its genesis in other nodes for communication extending beyond transmission range. Usually, ad hoc network routing protocols are built to function well in non-adversarial surroundings. Routing protocol security is critical in settings where networks face attacks which disrupt communication. This paper proposes to simulate/study black hole attack impact in ad hoc networks with DSR routing protocol. The obtained output is the basis for a novel statistical method to identify black hole attack based on RREQ control packet sequence. The proposed method is able to identify black hole attacks in the network and avoid the node during new route discovery.

References
  1. Lidong Zhou, Zygmunt J. Haas, "Securing Ad Hoc Networks", IEEE Network Magazine, Vol. 13, No. 6, Nov. /Dec. 1999, pp. 24–30.
  2. S. Buchegger, J. -Y. L. Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, in: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, IEEE Computer Society, Canary Islands, Spain, 2002, pp. 403–410.
  3. D. B. Johnson and D. A. Maltz. The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, October 1999.
  4. David B. Johnson. Routing in Ad Hoc Networks of Mobile Hosts. In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'94), December 1994, pp. 158–163.
  5. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. Technical Report TR01-384, Department of Computer Science, Rice University, June 2002.
  6. Ralf Hauser, Antoni Przygienda, and Gene Tsudik. Reducing the Cost of Security in Link State Routing. In Symposium on Network and Distributed Systems Security (NDSS '97), February 1997, pp. 93–99.
  7. Andy Heffernan. Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385, August 1998.
  8. Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Ef?cient and Secure Source Authentication for Multicast. In Network and Distributed System Security Symposium, NDSS '01, February 2001, pp. 35–46.
  9. Seung Yi , Prasad Naldurg , Robin Kravets, "Security-aware ad hoc routing for wireless networks," Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, October 04-05, 2001, Long Beach, CA, USA.
  10. Y. -C. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, Atlanta, GA, Sept. 2002.
  11. S. Marti, T. Giuli, K. Lai, and M. Baker. "Mitigating routing misbehavior in mobile ad hoc networks. " In Proceedings of MOBICOM' 2000, 2000, pp. 255–265.
Index Terms

Computer Science
Information Sciences

Keywords

Adhoc network network security network attacks Dynamic Source Routing (DSR)