Advertisement

Wireless Networks

, Volume 24, Issue 8, pp 2943–2955 | Cite as

DEBH: detecting and eliminating black holes in mobile ad hoc network

  • Ali Dorri
  • Soroush Vaseghi
  • Omid Gharib
Article
  • 207 Downloads

Abstract

Security in mobile ad hoc network (MANET) is one of the key challenges due to its special features e.g. hop-by-hop communications, dynamic topology, and open network boundary that received tremendous attention by scholars. Traditional security methods are not applicable in MANET due to its special properties. In this paper, a novel approach called detecting and eliminating black holes (DEBH) is proposed that uses a data control packet and an additional black hole check table for detecting and eliminating malicious nodes. Benefiting from trustable nodes, the processing overhead of the security method decreases by passing time. Ad hoc on-demand distance vector (AODV) routing protocol is used as the routing protocol in our design. After finding the freshest path using AODV, our design checks the safety of selected path. In case of detecting any malicious node, it is isolated from the entire network by broadcasting a packet that contains the ID of malicious nodes. Simulation results show that DEBH increases network throughput and decreases packet overhead and delay in comparison with other studied approaches. Moreover, DEBH is able to detect all active malicious nodes which generates fault routing information.

Keywords

Black hole attack Malicious node Routing attack Security challenges 

References

  1. 1.
    Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63, 4647–4658.CrossRefGoogle Scholar
  2. 2.
    Zehua, W., Yuanzhu, C., & Cheng, L. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 859–868.CrossRefGoogle Scholar
  3. 3.
    Dorri, Ali, & Kamel, Seyed Reza. (2015). A fuzzy congestion controller to detect and balance congestion in WSN. International Journal of Wireless & Mobile Networks, 7(1), 137.CrossRefGoogle Scholar
  4. 4.
    Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15, 2027–2045.CrossRefGoogle Scholar
  5. 5.
    Dorri, A., Kamel, R., & Kheyrkhah, E. (2014). An analyses in security challenges in mobile ad hoc network. Presented at the sixth international conference on Wireless and Mobile networks (WiMoNe 2014).Google Scholar
  6. 6.
    Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: A survey. International Journal of Computer Science and Engineering Survey (IJCSES), 6(1), 15–29.CrossRefGoogle Scholar
  7. 7.
    Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4, 212–232.CrossRefGoogle Scholar
  8. 8.
    Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Third international conference on advanced computing and communication technologies (ACCT), 2013 (pp. 254–260).Google Scholar
  9. 9.
    Kalwar, S. (2010). Introduction to reactive protocol. IEEE Potentials, 29, 34–35.CrossRefGoogle Scholar
  10. 10.
    Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & Tutorials, 10, 78–93.CrossRefGoogle Scholar
  11. 11.
    Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.CrossRefGoogle Scholar
  12. 12.
    Kamatchi, V., Mukesh, R., & Rajakumar, (2013). Securing data from black hole attack using AODV routing for mobile ad hoc networks. In N. Meghanathan, D. Nagamalai, & N. Chaki (Eds.), Advances in computing and information technology (Vol. 177, pp. 365–373). Berlin: Springer.CrossRefGoogle Scholar
  13. 13.
    Banerjee, S., Sardar, M., & Majumder, K. (2014). AODV based black-hole attack mitigation in MANET. In S. C. Satapathy, S. K. Udgata, & B. N. Biswal (Eds.), Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA) 2013 (Vol. 247, pp. 345–352). Berlin: Springer International Publishing.CrossRefGoogle Scholar
  14. 14.
    Lo, N.-W., & Liu, F.-L. (2013). A secure routing protocol to prevent cooperative black hole attack in MANET. In J. Juang & Y.-C. Huang (Eds.), Intelligent technologies and engineering systems (Vol. 234, pp. 59–65). New York: Springer.CrossRefGoogle Scholar
  15. 15.
    Jaisankar, N., Saravanan, R., & Swamy, K. D. (2010). A novel security approach for detecting black hole attack in MANET. In V. Das, R. Vijayakumar, N. Debnath, J. Stephen, N. Meghanathan, S. Sankaranarayanan, et al. (Eds.), Information processing and management (Vol. 70, pp. 217–223). Berlin: Springer.CrossRefGoogle Scholar
  16. 16.
    Dorri, A., & Nikdel, H. (2013). A new approach for detecting and eliminating cooperative black hole nodes in MANET. Presented at the 7th international conference on information and knowledge technology, Urima.Google Scholar
  17. 17.
    Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014) Prevention of black hole attack in AODV routing algorithm of MANET using trust based computing. International Journal of Computer Science and Information Technologies, 5, 3254–3258.Google Scholar
  18. 18.
    Chhari, V., Singh, R., & Dhakad, S. S. (2014). Enhanced and more secure AODV routing protocol to avoid black hole attack in MANET. IJCSNT.Google Scholar
  19. 19.
    Dorri, A. (2016). An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. International Journal of Wireless Networks. doi: 10.1007/s11276-016-1251-x.CrossRefGoogle Scholar
  20. 20.
    Varshney, T., Sharma, T., & Sharma, P. (2014). Implementation of watchdog protocol with AODV in mobile ad hoc network. In Fourth international conference on communication systems and network technologies (CSNT), 2014 (pp. 217–221).Google Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Department of Computer Engineering, Mashhad BranchIslamic Azad UniversityMashhadIran
  2. 2.Department of Computer Science, Faculty of EngineeringUniversity of BojnordBojnordIran

Personalised recommendations