IDS Scheme for Blackhole Attack on MANETs

Chapter
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 235)

Abstract

Blackhole attack is one of typical intrusion to routing function on Mobile Ad-hoc Network(MANET)s. Blackhole attacking may cause severe transmission performance deterioration of network, because of absorption of all packets be delivered to destination and all routing messages be propagated to nodes on MANETs. Detecting and avoiding of blackhole attacking from malicious is very important to keep network performance. In this paper, an Intrusion Detection System (IDS) scheme for blackhole attack on MANETs is suggested with pre-routing. Transmission performance of this suggested scheme is shown with NS-2 simulations.

Keywords

IDS Blackhole MANET AODV Routing simulation Performance 

References

  1. 1.
    Hongmei D, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75CrossRefGoogle Scholar
  2. 2.
    Bala A, Kumari R, Singh J (2010) Investigation of blackhole attack on AODV in MANET. J Emerg Technol Web Intell 2(2):96–100Google Scholar
  3. 3.
    Tseng F-H, Chou L-D, Chao H-C (2011) A survey of black hole attacks in wireless mobile ad hoc networks. J HCIS 1(1)Google Scholar
  4. 4.
    Kim YD (2012) Transmission performance of VoIP traffic under blackhole attack on MANET. Proceedings of KIICSC 2011, vol 15, no 2, pp 637–640Google Scholar
  5. 5.
    Al-Shurman M, Yoo SM, Park S (2004) Black hole attack in mobile ad hoc networks. Proceedings of the 42nd southeast regional conference, ACM-SE 42, pp 96–97 (2004)Google Scholar
  6. 6.
    Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int J Netw Secur 5(3):338–346Google Scholar
  7. 7.
    Venkatraman L, Agrawal DP (2003) Strategies for enhancing routing security in protocols for mobile ad hoc networks. J Parallel Distrib comput 63(2):214–227MATHCrossRefGoogle Scholar
  8. 8.
    Kim YD (2012) Transmission performance of application service traffic on MANET with IDS. Proceedings of KIICSC 2012, vol 16, no 1, pp 584–587Google Scholar
  9. 9.
    Himral L, Vig V, Chand N (2011) Preventing AODV routing protocol from black hole attack. IJEST 3(5):3927–3932Google Scholar
  10. 10.
    Weerasings H, Fu H (2008) Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. Int J Softw Eng Appl 2(3):39–54Google Scholar
  11. 11.
  12. 12.
    Dokurer S (2006) Simulation of black hole attack in wireless ad-hoc networks. Mater’s thesis, Atilim UniversityGoogle Scholar
  13. 13.
    Dokurer S, Erten YM, Acar CE (2007) Performance analysis of ad-hoc networks under black hole attacks. Proceedings of IEEE southeastcon 2007, pp 148–153Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department of Information and Communications EngineeringDongyang UniversityYeongjuKorea
  2. 2.Department of Information and Communications EngineeringDongeui UniversityBusanKorea

Personalised recommendations