Skip to main content
Log in

Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

A Wireless Mesh Network (WMN) is a promising way of providing low-cost broadband Internet access. The underlying routing protocol naively assumes that all the nodes in the network are non-malicious. The open architecture of WMN, multi-hop nature of communication, different management styles, and wireless communication paves way to malicious attackers. The attackers can exploit hidden loopholes in the multipath mesh routing protocol to have a suction attack called the blackhole attack. The attacker can falsify routing metrics such as the shortest transmission time to reach any destination and thereby suck the network traffic.

We propose a novel strategy by employing mobile honeypot agents that utilize their topological knowledge and detect such spurious route advertisements. They are deployed as roaming software agents that tour the network and lure attackers by sending route request advertisements. We collect valuable information on attacker’s strategy from the intrusion logs gathered at a given honeypot. We finally evaluate the effectiveness of the proposed architecture using simulation in ns-2.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Agrawal DP, Zeng Q-A (2006) Introduction to wireless and mobile networks, 2nd edn. Brookes Cole Publishing, Pacific Grove

    Google Scholar 

  2. Akyildiz IF, Wang X (2005) A survey on Wireless Mesh Networks. IEEE Commun Mag (Sept)

  3. Ben Salem N, Hubaux JP (2006) Securing Wireless Mesh Networks. IEEE Wirel Commun (Apr)

  4. Bhargava S, Agrawal DP (2001) Security enhancements in AODV protocol for wireless ad hoc networks. In: IEEE vehicular technology conference, VTS 54th, vol 4, pp 2143–2147

    Google Scholar 

  5. Campista MEM, Esposito PM, Moraes IM, Costa LHMK, Duarte OCMM, Passos DG, Albuquereque CVN, Saade DCM, Rubistein MG (2008) Routing metrics and protocols for Wireless Mesh Networks. IEEE Commun Mag 22(1):6–12

    Google Scholar 

  6. Cordeiro C, Agrawal DP (2006) Ad hoc and sensor networks: theory and application. World Scientific, Singapore

    Book  Google Scholar 

  7. Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc network. IEEE Commun Mag 40(10)

  8. http://www.earthlink.net (2011)

  9. Hu Y, Perrig A, Johnson DB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proc of ACM Mobicom, pp 12–23

    Google Scholar 

  10. Hu Y, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw 175–192

  11. Huang Y-A, Lee W (2003) A cooperative intrusion detection system for ad hoc networks. In: Proceedings of 1st ACM workshop on ad hoc and sensor networks, pp 135–147

    Chapter  Google Scholar 

  12. Karakehayov Z (2007) Security–lifetime tradeoffs for wireless sensor networks. In: Emerging technologies & Factory automation, ETFA, IEEE, Sept 2007, pp 246–250

    Google Scholar 

  13. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: First IEEE international workshop on sensor network protocols and applications (SNPA 03), May 2003, pp 113–127

    Chapter  Google Scholar 

  14. Khattab S, Melhem R, Mosse D, Znati T (2006) Honeypot back-propagation for mitigating spoofing distributed Denial-of-service attacks. J Parallel Distrib Comput 66:1152–1164

    Article  MATH  Google Scholar 

  15. Nandiraju D (2009) Efficient traffic diversion and load balancing in wireless mesh networks. Ph.D. Dissertation, University of Cincinnati

  16. Nandiraju N, Nandiraju D, Santhanam L, He B, Wang J, Agrawal DP (2007) Wireless mesh networks: current challenges and future directions of web-in-the-sky. IEEE Commun Mag 14(4):2–12

    Article  Google Scholar 

  17. Network Simulator (NS-2) (2011) http://www.isi.edu/nsnam/ns/index.html

  18. Ning P, Sun K (2005) How to misuse AODV: a case study of insider attacks against mobile ad hoc routing protocols. Ad Hoc Netw 3(6):795–819

    Article  Google Scholar 

  19. Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K (2003) Prevention of cooperative black hole attack in wireless ad hoc networks. In: Proceedings of the international conference on wireless networks, June 2003

    Google Scholar 

  20. Ruiz J-C, Friginal J, Andres D, Gil P (2011) Blackhole attack injection in ad hoc networks. In: Fault tolerance systems group (GSTF). http://www.ece.cmu.edu/~koopman/dsn08/fastabs/dsn08fastabs_ruiz.pdf

    Google Scholar 

  21. Santhanam L (2008) Integrated security architecture for Wireless Mesh Networks. Ph.D. Dissertation, University of Cincinnati, Mar 2008

  22. Santhanam L, Mukherjee A, Bhatnagar R, Agrawal DP (2007) A perceptron based classifier for detecting malicious route floods in Wireless Mesh Networks. In: 3rd Intl conference on wireless and mobile communications, Guadeloupe, French Caribbean, 4–9 March, 2007

    Google Scholar 

  23. Santhanam L, Nandiraju N, Yoo Y, Agrawal DP (2006) Distributed self-policing architecture for fostering node cooperation in Wireless Mesh Networks. In: Personal wireless communication, Sept 20–22, Spain. Lecture notes in computer science, vol 4217/2006. Springer, Berlin, pp 147–158

    Chapter  Google Scholar 

  24. Shurman MA, Yoo S-M, Park S (2004) Blackhole attack in mobile ad hoc networks. In: Proceedings of ACM of 42nd annual south-east conference regional conference, pp 96–97

    Google Scholar 

  25. Spintzer L (2003) The honeynet project: trapping the hackers. IEEE Secur Priv Mag 1(2)

  26. The Honeynet Project (2011) http://www.honeynet.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dharma P. Agrawal.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Prathapani, A., Santhanam, L. & Agrawal, D.P. Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. J Supercomput 64, 777–804 (2013). https://doi.org/10.1007/s11227-010-0547-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-010-0547-3

Keywords

Navigation