Abstract
Wireless ad hoc networks become more and more popular and significant in many fields. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, such as blackhole attacks. In this paper, we proposed a scheme to prevent blackhole attacks in wireless ad hoc networks. Our scheme consists of three mechanisms which are trust management mechanism, detection mechanism and location mechanism. The performance simulation analysis confirms the availability and efficiency of our scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jurdak, R., Lopes, C.V., Baldi, P.: A survey, classification and comparative analysis of medium access control protocols for ad hoc networks. Commun. Surv. Tutor. 6(1), 2–16 (2009)
Bala, A., Bansal, M., Singh, J.: Performance analysis of MANET under blackhole attack. Netw. Commun. 141–145 (2009)
Kurosawa, S., et al.: Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int. J. Netw. Secur. 5(3), 338–346 (2007)
Mistry, N.H., Jinwala, D.C., Zaveri, M.A.: MOSAODV: solution to secure AODV against blackhole attack. Int. J. Comput. Netw. Secur. 1(3), 42–45 (2009)
Tsou, P.-C., Chang, J.-M., Lin, Y.-H., Chao, H.-C., Chen, J.-L.: Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. In: 13th International Conference on Advanced Communication Technology, Gangwon-Do, pp. 755–760 (2011)
Chang, J.-M., Tsou, P.-C., Chao, H.-C., Chen, J.-L.: CBDS: a cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture. In: 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronics Systems Technology, Chennai, pp. 1–5 (2011)
Faragó, A.: Scalable analysis and design of ad hoc networks via random graph theory. In: Workshop on Discrete Algorithms and Methods for MOBILE Computing and Communications, New York, pp. 43–50 (2002)
Tsumoto, S., Hirano, S: Visualization of rule’s similarity using multidimensional scaling. In: 3rd IEEE International Conference on Data Mining, Florida, pp. 339–346 (2003)
Rodriguez-Mayol, A., Gozalvez, J.: On the implementation feasibility of reputation techniques for cooperative mobile ad-hoc networks. In: European Wireless Conference, Tuscany, pp. 616–623 (2010)
Johnson, D.B., Maltz, D.A., Broch, J.: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins C.E. (ed.) Ad Hoc Networking, Chapter 5. Addison-Wesley, Boston, pp. 139–172 (2001)
Fall, K., Varadhan, K.: The ns manual. http://www.isi.edu/nsnam/ns/doc/index.html
Zhou, X., Ge, Y., Chen, X., Jing, Y., Sun, W.: A distributed cache based reliable service execution and recovery approach in MANETs. JoC 3(1), 5–12 (2011)
Shbat, M.S., Tuzlukov, V.: Dynamic frequency reuse factor choosing method for self organizing LTE networks. JoC 2(2), 13–18 (2011)
Tseng, F.-H., Chou, L.-D., Chao, H.-C.: A survey of black hole attacks in wireless mobile ad hoc networks. HCIS 1(4), 1–4 (2011). doi:10.1186/2192-1962-1-4
Hiyama, M., Kulla, E., Oda, T., Ikeda, M., Barolli, L.: Application of a MANET testbed for horizontal and vertical scenarios: performance evaluation using delay and jitter metrics. HCIS 1(3), 1–3 (2011). doi:10.1186/2192-1962-1-3
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Shi, F., Liu, W., Jin, D. (2012). Preventing Blackhole Attack in DSR-Based Wireless Ad Hoc Networks. In: Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 203. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5699-1_96
Download citation
DOI: https://doi.org/10.1007/978-94-007-5699-1_96
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5698-4
Online ISBN: 978-94-007-5699-1
eBook Packages: Computer ScienceComputer Science (R0)