DOI QR코드

DOI QR Code

Black Hole along with Other Attacks in MANETs: A Survey

  • Tseng, Fan-Hsun (Dept. of Technology Application and Human Resource Development, National Taiwan Normal University) ;
  • Chiang, Hua-Pei (Network and Technology Division, FarEasTone Telecommunications Co. Ltd.) ;
  • Chao, Han-Chieh (Dept. of Electrical Engineering, National Dong Hwa University, Hualien, Taiwan, Dept. of Computer Science and Information Engineering, National Ilan University)
  • Received : 2017.10.30
  • Accepted : 2017.12.26
  • Published : 2018.02.28

Abstract

Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.

Keywords

E1JBB0_2018_v14n1_56_f0001.png 이미지

Fig. 1. A black hole attack based on forged route reply packet.

E1JBB0_2018_v14n1_56_f0002.png 이미지

Fig. 2. Roadmap of this survey.

E1JBB0_2018_v14n1_56_f0003.png 이미지

Fig. 3. The four fields of pending packet table in [45].

E1JBB0_2018_v14n1_56_f0004.png 이미지

Fig. 4. The four fields of node rating table in [45].

Table 1. Taxonomy of references in this survey

E1JBB0_2018_v14n1_56_t0001.png 이미지

E1JBB0_2018_v14n1_56_t0002.png 이미지

Table 2. The detection schemes for non-cooperative black hole attack in MANET

E1JBB0_2018_v14n1_56_t0003.png 이미지

Table 2. (Continued)

E1JBB0_2018_v14n1_56_t0004.png 이미지

Table 3. The detection schemes for collaborative black hole attack in MANET

References

  1. J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, TX, 1998, pp. 85-97.
  2. A. Nadeem and M. P. Howarth, "A Survey of MANET intrusion detection & prevention approaches for network layer attacks," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2027-2045, 2013. https://doi.org/10.1109/SURV.2013.030713.00201
  3. F. H. Tseng, L. D. Chou, and H. C. Chao, "A survey of black hole attacks in wireless mobile ad hoc networks," Human-centric Computing and Information Sciences, vol. 1, article no. 4, 2011.
  4. E. M. Royer and C. K. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications, vol. 6, no. 2, pp. 46-55, 1999. https://doi.org/10.1109/98.760423
  5. C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), New Orleans, LA, 1999, pp. 90- 100.
  6. D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Computing, vol. 353, pp. 153-181, 1996.
  7. C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in Proceedings of Conference on Communications Architectures (SIGCOMM '94), Protocols and Applications, London, UK, 1994, pp. 234-244.
  8. P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot, "Optimized link state routing protocol for ad hoc networks," in Proceedings of the IEEE International Multi Topic Conference (INMIC): Technology for the 21st Century, 2001, pp. 62-68.
  9. V. Park and S. Corson, "Temporally-ordered routing algorithm (TORA) version 1: functional specification," The Internet Engineering Task Force, Fremont, CA, Internet Draft, 1997.
  10. Z. J. Haas, M. R. Pearlman, and P. Samar, "The zone routing protocol (ZRP) for ad hoc networks," The Internet Engineering Task Force, Fremont, CA, Internet Draft, 2002.
  11. R. Lakhwani, S. Suhane, and A. Motwani, "Agent based AODV protocol to detect and remove black hole attacks," International Journal of Computer Applications, vol. 59, no. 8, pp. 35-39, 2012.
  12. N. Sharma and A. Sharma, "The black-hole node attack in MANET," in Proceedings of 2nd International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2012, pp. 546-550.
  13. M. Al-Shurman, S. M. Yoo, and S. Park, "Black hole attack in mobile ad hoc networks," in Proceedings of the 42nd Annual ACM Southeast Regional Conference, Huntsville, AL, 2004, pp. 96-97.
  14. N. R. Yerneni and A. K. Sarje, "Secure AODV protocol to mitigate black hole attack in mobile ad hoc," in Proceedings of 3rd International Conference on Computing Communication & Networking Technologies (ICCCNT), Coimbatore, India, 2012, pp. 1-5.
  15. F. Thachil and K. C. Shet, "A trust based approach for AODV protocol to mitigate black hole attack in MANET," in Proceedings of International Conference on Computing Sciences, Phagwara, India, 2012, pp. 281-285.
  16. R. K. Bar, J. K. Mandal, and M. M. Singh, "QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack," Procedia Technology, vol. 10, pp. 530-537, 2013. https://doi.org/10.1016/j.protcy.2013.12.336
  17. S. Biswas, T. Nag, and S. Neogy, "Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET," in Proceeding of Applications and Innovations in Mobile Computing (AIMoC), Kolkata, India, 2014, pp. 157-164.
  18. A. Sharma, R. Singh, and G. Pandey, "Detection and prevention from black hole attack in AODV protocol for MANET," International Journal of Computer Applications, vol. 50, no. 5, pp. 1-4, 2012. https://doi.org/10.5120/7764-0837
  19. P. K. Singh and G. Sharma, "An efficient prevention of black hole problem in AODV routing protocol in MANET," in Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 2012, pp. 902-906.
  20. K. Vishnu and A. J. Paul, "Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks," International Journal of Computer Applications, vol. 1, no. 22, pp. 38-42, 2010.
  21. P. Jaiswal and R. Kumar, "Prevention of black hole attack in MANET," International Journal of Computer Networks and Wireless Communications, vol. 2, no. 5, pp. 599-606, 2012.
  22. N. Mistry, D. C. Jinwala, and M. Zaveri, "Improving AODV protocol against blackhole attacks," in Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, pp. 1034-1039, 2010.
  23. L. Tamilselvan and V. Sankaranarayanan, "Prevention of blackhole attack in MANET," in Proceedings of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), Sydney, Australia, 2007, pp. 21-21.
  24. K. S. Sujatha, V. Dharmar, and R. S. Bhuvaneswaran, "Design of genetic algorithm based IDS for MANET," in Proceedings of International Conference on Recent Trends in Information Technology, Chennai, India, 2012, pp. 28-33.
  25. R. Kumar and R. Chadha, "Mitigation of black hole attack using generic algorithms and fuzzy logic," International Journal of Engineering Sciences & Research Technology, vol. 5, no. 6, pp. 818-826, 2016.
  26. Sonia and H. Kaur, "Proficient and enhance the mobile ad-hoc network using routing protocol and EBFOA (Enhanced Bacteria Foraging Optimization Algorithm)," International Journal of Modern Computer Science, vol. 4, no. 6, pp. 88-94, 2016.
  27. K. M. Passino, "Biomimicry of bacterial foraging for distributed optimization and control," IEEE Control Systems, vol. 22, no. 3, pp. 52-67, 2002. https://doi.org/10.1109/MCS.2002.1004010
  28. K. S. Sowmya, T. Rakesh, and D. P. Hudedagaddi, "Detection and prevention of blackhole attack in MANET using ACO," International Journal of Computer Science and Network Security, vol. 12, no. 5, pp. 21-24, 2012.
  29. D. G. Kariya, A. B. Kathole, and S. R. Heda, "Detecting black and gray hole attacks in mobile ad hoc network using an adaptive method," International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 1, pp. 37-41, 2012.
  30. I. Woungang, S. K. Dhurandher, M. S. Obaidat, and R. D. Peddi, "A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks," Security and Communication Networks, vol. 9, no. 5, pp. 420-428, 2016. https://doi.org/10.1002/sec.766
  31. M. Mohanapriya and I. Krishnamurthi, "Modified DSR protocol for detection and removal of selective black hole attack in MANET," Computers and Electrical Engineering, vol. 40, no. 2, pp. 530-538, 2014. https://doi.org/10.1016/j.compeleceng.2013.06.001
  32. S. Kumar and K. Dutta, "Intrusion detection technique for black hole attack in mobile ad hoc networks," International Journal of Information Privacy, Security and Integrity, vol. 2, no. 2, pp. 81-101, 2015. https://doi.org/10.1504/IJIPSI.2015.075435
  33. M. Patel and S. Sharma, "Detection of malicious attack in MANET a behavioral approach," in Proceeding of 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 2013, pp. 388-393.
  34. S. Tan and K. Kim, "Secure route discovery for preventing black hole attacks on AODV-based MANETs," in Proceedings of International Conference on ICT Convergence (ICTC), Jeju, Korea, 2013, pp. 1027-1032.
  35. U. Ghosh and R. Datta, "SDRP: secure and dynamic routing protocol for mobile ad-hoc networks," IET Networks, vol. 3, no. 3, pp. 235-243, 2014. https://doi.org/10.1049/iet-net.2013.0056
  36. T. Varshney, T. Sharma, and P. Sharma, "Implementation of watchdog protocol with AODV in mobile ad hoc network," in Proceeding of 4th International Conference on Communication Systems and Network Technologies, Bhopal, India, 2014, pp. 217-221.
  37. S. Shahabi, M. Ghazvini, and M. Bakhtiarian, "A modified algorithm to improve security and performance of AODV protocol against black hole attack," Wireless Networks, vol. 22, no. 5, pp. 1505-1511, 2016. https://doi.org/10.1007/s11276-015-1032-y
  38. A. Siddiqua, K. Sridevi, and A. A. K. Mohammed, "Preventing black hole attacks in MANETs using secure knowledge algorithm," in Proceedings of International Conference on Signal Processing and Communication Engineering Systems, Guntur, India, 2015, pp. 421-425.
  39. A. M. Fahad and R. C. Muniyandi, "Harmony search algorithm to prevent malicious nodes in mobile ad hoc networks (MANETs)," Information Technology Journal, vol. 15, no. 3, pp.84-90, 2016. https://doi.org/10.3923/itj.2016.84.90
  40. J. M. Chang, P. C. Tsou, I. Woungang, H. C. Chao, and C. F. Lai, "Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach," IEEE Systems Journal, vol. 9, no. 1, pp. 65-75, 2015. https://doi.org/10.1109/JSYST.2013.2296197
  41. M. B. M. Kamel, I. Alameri, and A. N. Onaizah, "STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET," in Proceedings of IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 2017, pp. 1278-1282.
  42. R. Das, B. S. Purkayastha, and P. Das, "Security measures for black hole attack in MANET: an approach," International Journal of Engineering Science and Technology, vol. 3, no. 4, pp. 2832-2838, 2011.
  43. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of cooperative black hole attack in wireless ad hoc networks," in Proceedings of the International Conference on Wireless Networks, Las Vegas, NV, 2003, pp. 570-575.
  44. H. Weerasinghe and H. Fu, "Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation," in Proceedings of Future Generation Communication and Networking (FGCN 2007), Jeju, Korea, 2007, pp. 362-367.
  45. A. A. Bhosle, T. P. Thosar, and S. Mehatre, "Black-hole and wormhole attack in routing protocol AODV in MANET," International Journal of Computer Science, Engineering and Applications (IJCSEA), vol. 2, no. 1, pp. 45-54, 2012. https://doi.org/10.5121/ijcsea.2012.2105
  46. I. Woungang, S. K. Dhurandher, R. D. Peddi, and I. Traore, "Mitigating collaborative blackhole attacks on DSR-based mobile ad hoc networks," in Proceedings of the International Symposium on Foundations and Practice of Security, Montreal, Canada, 2012, pp. 308-323.
  47. J. M. Chang, P. C. Tsou, H. C. Chao, and J. L. Chen, "CBDS: a cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture," in Proceedings of 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), Chennai, India, 2011, pp. 1-5.
  48. P. C. Tsou, J. M. Chang, Y. H. Lin, H. C. Chao, and J. L. Chen, "Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs," in Proceedings of 13th International Conference on Advanced Communication Technology (ICACT2011), Seoul, Korea, 2011, pp. 755-760.
  49. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536-550, 2007. https://doi.org/10.1109/TMC.2007.1036
  50. Y. Xue and K. Nahrstedt, "Providing fault-tolerant ad hoc routing service in adversarial environments," Wireless Personal Communications, vol. 29, no. 3-4, pp. 367-388, 2004. https://doi.org/10.1023/B:WIRE.0000047071.75971.cd
  51. G. S. Bindra, A. Kapoor, A. Narang, and A. Agrawal, "Detection and removal of co-operative blackhole and grayhole attacks in MANETs," in Proceedings of International Conference on System Engineering and Technology (ICSET), Bandung, Indonesia, 2012, pp. 1-5.
  52. A. Mishra, R. Jaiswal, and S. Sharma, "A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network," in Proceedings of 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 2013, pp. 499-504.
  53. S. K. Dhurandher, I. Woungang, R. Mathur, and P. Khurana, "GAODV: a modified AODV against single and collaborative black hole attacks in MANETs," in Proceedings of 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 2013, pp. 357-362.
  54. A. A. Aware and K. Bhandari, "Prevention of black hole attack on AODV in MANET using hash function," in Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, 2014, pp. 1-6.
  55. R. J. Cai, X. J. Li, and P. H. J. Chong, "A novel self-checking ad hoc routing scheme against active black hole attacks," Security and Communication Networks, vol. 9 no. 10, pp. 943-957, 2016. https://doi.org/10.1002/sec.1390
  56. N. Arya, U. Singh, and S. Singh, "Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm," in Proceedings of International Conference on Computer, Communication and Control (IC4), Indore, India, 2015, pp. 1-5.
  57. K. S. Arathy and C. N. Sminesh, "A novel approach for detection of single and collaborative black hole attacks in MANET," Procedia Technology, vol. 25, pp. 264-271, 2016. https://doi.org/10.1016/j.protcy.2016.08.106
  58. M. Sathish, K. Arumugam K, S. N. Pari, and V. S. Harikrishnan, "Detection of single and collaborative black hole attack in MANET," in Proceedings of International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016, pp. 2040-2044.
  59. B. Cerda, E. Martinez-Belmares, and S. Yuan, "Protection from black hole attacks in communication networks," in Proceedings of the International Conference on Security and Management, Las Vegas, NV, 2017, pp. 7-11.
  60. S. Sharma and S. Gambhir, "CRCMD&R: cluster and reputation based cooperative malicious node detection & removal scheme in MANETs," in Proceedings of 11th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 2017, pp. 336-340.
  61. C. W. Tsai, "Incremental particle swarm optimisation for intrusion detection," IET Networks, vol. 2, no. 3, pp. 124-130, 2013. https://doi.org/10.1049/iet-net.2012.0209
  62. A. Mitrokotsa and C. Dimitrakakis, "Intrusion detection in MANET using classification algorithms: the effects of cost and model selection," Ad Hoc Networks, vol. 11, no. 1, pp. 226-237, 2013. https://doi.org/10.1016/j.adhoc.2012.05.006
  63. J. S. Park, D. H. Choi, Y. B. Jeon, Y. Nam, M. Hong, and D. S. Park, "Network anomaly detection based on probabilistic analysis," Soft Computing, 2017. https://doi.org/10.1007/s00500-017-2679-3
  64. R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, "DoS attacks in mobile ad hoc networks: a survey," in Proceedings of 2nd International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2012, pp. 535-541.
  65. P. Sharma, N. Sharma, and R. Singh, "A secure intrusion detection system against DDOS attack in wireless mobile ad-hoc network," International Journal of Computer Applications, vol. 41, no. 21, pp. 16-21, 2012. https://doi.org/10.5120/5824-8064
  66. E. M. Shakshuki, N. Kang, and T. R. Sheltami, "EAACK-a secure intrusion-detection system for MANETs," IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1089-1098, 2013. https://doi.org/10.1109/TIE.2012.2196010
  67. N. Kang, E. Shakshuki, and T. Sheltami, "Detecting misbehaving nodes in MANETs," in Proceedings of the 12th International Conference on Information Integration and Web-Based Applications & Services, Paris, France, 2010, pp. 216-222.
  68. F. Shi, W. Liu, D. Jin, and J. Song, "A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology," Electronic Commerce Research, vol. 13, no. 3, pp. 329-345, 2013. https://doi.org/10.1007/s10660-013-9122-3
  69. J. Yu, H. Kang, D. H. Park, H. C. Bang, and D. W. Kang, "An in-depth analysis on traffic flooding attacks detection and system using data mining techniques," Journal of Systems Architecture, vol. 59, no. 10, pp. 1005-1012, 2013. https://doi.org/10.1016/j.sysarc.2013.08.008
  70. F. C. Jiang, C. H. Lin, and H. W. Wu, "Lifetime elongation of ad hoc networks under flooding attack using power-saving technique," Ad Hoc Networks, vol. 21, pp. 84-96, 2014. https://doi.org/10.1016/j.adhoc.2014.05.002
  71. R. J. Hwang and Y. K. Hsiao, "An anonymous distributed routing protocol in mobile ad-hoc networks," The Journal of Supercomputing, vol. 66, no. 2, pp. 888-906, 2013. https://doi.org/10.1007/s11227-013-0920-0
  72. S. Abbas, M. Merabti, D. Llewellyn-Jones, and K. Kifayat, "Lightweight Sybil attack detection in MANETs," IEEE Systems Journal, vol. 7, no. 2, pp. 236-248, 2013. https://doi.org/10.1109/JSYST.2012.2221912