CFP last date
20 March 2024
Reseach Article

Mitigation of Multiple Blackhole Attack in WMN

Published on December 2013 by Arijita Bhowmik, Abhishek Majumder
2nd International conference on Computing Communication and Sensor Network 2013
Foundation of Computer Science USA
CCSN2013 - Number 1
December 2013
Authors: Arijita Bhowmik, Abhishek Majumder
d5379865-882f-49ab-8770-8a95494abd30

Arijita Bhowmik, Abhishek Majumder . Mitigation of Multiple Blackhole Attack in WMN. 2nd International conference on Computing Communication and Sensor Network 2013. CCSN2013, 1 (December 2013), 1-4.

@article{
author = { Arijita Bhowmik, Abhishek Majumder },
title = { Mitigation of Multiple Blackhole Attack in WMN },
journal = { 2nd International conference on Computing Communication and Sensor Network 2013 },
issue_date = { December 2013 },
volume = { CCSN2013 },
number = { 1 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/ccsn2013/number1/14750-1302/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd International conference on Computing Communication and Sensor Network 2013
%A Arijita Bhowmik
%A Abhishek Majumder
%T Mitigation of Multiple Blackhole Attack in WMN
%J 2nd International conference on Computing Communication and Sensor Network 2013
%@ 0975-8887
%V CCSN2013
%N 1
%P 1-4
%D 2013
%I International Journal of Computer Applications
Abstract

Wireless Mesh Networks (WMNs) is an emerging technology. Amongst number of challenging issues, security is a very serious issue in WMNs. If the network is not secured, network will be confined to a limited and controlled environment. In WMNs, the static mesh routers (MRs) cooperate with each other to forward packets. The routing protocols assume that all the routers in the network are reliable. Due to open architecture of the WMNs, it suffers from various types of denial of service attacks like collision attacks, packet dropping and misdirection, blackhole attack and multiple blackhole attack. In black hole attack, the routers advertise itself to have a valid route to a destination router, though the route is unauthentic. Some routers can also co-operate with each other to implement multiple blackhole attacks. Many Intrusion Detection Systems (IDSs) such as use of honeypot and routing protocols like modified Ad hoc On-Demand Distance Vector Routing (AODV) have been introduced. In this paper, an algorithm for intrusion detection against multiple blackhole attacks has been proposed. The proposed scheme uses the Data Routing Information Table (DRI) to accurately diagnose multiple black hole attack.

References
  1. A. Prathapani, L. Santhanam, and D. P. Agrawal, "Intelligent honeypot agent for blackhole attack detection in wireless mesh networks", in Proc. of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, pp. 753—758, 2009.
  2. N. Patil, "Service Discovery in Wireless Mesh Networks", Department of Information Technology, IIIT Allahabad, Allahabad, 2005. 22
  3. J. Wang et al. , "An Intrusion Detection System Approach for Wireless Mesh Networks Based on Finite State Machine". Draft available at: http://www. cs. ucla. edu/~wangzy/inestablishment/resource/IDS_draft. pdf (last accessed March 24, 2012)
  4. http://en. wikipedia. org/wiki/Intrusion_detection_system
  5. T. M. Chen, G. S. Kuo, Z. P. Li, and G. M. Zhu,"Intrusion detection in wireless mesh networks," Security in wireless mesh networks, Auerbach Publication, pp. 145-167, 2008.
  6. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon and K. Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks" in Proc. of International Conference on Wireless Networks, pp. 1-7, 2003.
  7. O. Shree, F. J. Ogwu, "A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks", Wireless Sensor Network, vol. 5, no. 4, pp- 76-83, 2013.
  8. R. Suryawanshi, S. Tamhankar, "Performance Analysis And Minimization Of Black Hole Attack In MANET", IJERA, vol. 2, no. 4, pp. 1430-1437, 2012.
  9. P. Rawat1, S. Goel, M. Agarwal3 and R. Singh, "Securing WMN Using Hybrid Honeypot System," IJDPS, vol. 3, no. 3, pp. 29-34, 2012.
  10. L. Santhanam, A. Mukherjee, R. Bhatnagar, and D. P. Agrawal, "A Perception based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks", in Proc. of the International Multi-Conference on Computing in the Global Information Technology, pp. 35, 2007
Index Terms

Computer Science
Information Sciences

Keywords

Blackhole Data Routing Information Intrusion Detection Multiple Blackhole Wireless Mesh Networks.