Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0090

Black Hole along with Other Attacks in MANETs: A Survey  

Tseng, Fan-Hsun (Dept. of Technology Application and Human Resource Development, National Taiwan Normal University)
Chiang, Hua-Pei (Network and Technology Division, FarEasTone Telecommunications Co. Ltd.)
Chao, Han-Chieh (Dept. of Electrical Engineering, National Dong Hwa University, Hualien, Taiwan, Dept. of Computer Science and Information Engineering, National Ilan University)
Publication Information
Journal of Information Processing Systems / v.14, no.1, 2018 , pp. 56-78 More about this Journal
Abstract
Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.
Keywords
Collaborative Black Hole Attack; Flooding Attack; Mobile Ad Hoc Network; Non-cooperative Black Hole Attack; Wormhole Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Lakhwani, S. Suhane, and A. Motwani, "Agent based AODV protocol to detect and remove black hole attacks," International Journal of Computer Applications, vol. 59, no. 8, pp. 35-39, 2012.
2 N. Sharma and A. Sharma, "The black-hole node attack in MANET," in Proceedings of 2nd International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2012, pp. 546-550.
3 M. Al-Shurman, S. M. Yoo, and S. Park, "Black hole attack in mobile ad hoc networks," in Proceedings of the 42nd Annual ACM Southeast Regional Conference, Huntsville, AL, 2004, pp. 96-97.
4 N. R. Yerneni and A. K. Sarje, "Secure AODV protocol to mitigate black hole attack in mobile ad hoc," in Proceedings of 3rd International Conference on Computing Communication & Networking Technologies (ICCCNT), Coimbatore, India, 2012, pp. 1-5.
5 F. Thachil and K. C. Shet, "A trust based approach for AODV protocol to mitigate black hole attack in MANET," in Proceedings of International Conference on Computing Sciences, Phagwara, India, 2012, pp. 281-285.
6 A. Mitrokotsa and C. Dimitrakakis, "Intrusion detection in MANET using classification algorithms: the effects of cost and model selection," Ad Hoc Networks, vol. 11, no. 1, pp. 226-237, 2013.   DOI
7 J. S. Park, D. H. Choi, Y. B. Jeon, Y. Nam, M. Hong, and D. S. Park, "Network anomaly detection based on probabilistic analysis," Soft Computing, 2017. https://doi.org/10.1007/s00500-017-2679-3
8 R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, "DoS attacks in mobile ad hoc networks: a survey," in Proceedings of 2nd International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2012, pp. 535-541.
9 P. Sharma, N. Sharma, and R. Singh, "A secure intrusion detection system against DDOS attack in wireless mobile ad-hoc network," International Journal of Computer Applications, vol. 41, no. 21, pp. 16-21, 2012.   DOI
10 E. M. Shakshuki, N. Kang, and T. R. Sheltami, "EAACK-a secure intrusion-detection system for MANETs," IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1089-1098, 2013.   DOI
11 N. Kang, E. Shakshuki, and T. Sheltami, "Detecting misbehaving nodes in MANETs," in Proceedings of the 12th International Conference on Information Integration and Web-Based Applications & Services, Paris, France, 2010, pp. 216-222.
12 F. Shi, W. Liu, D. Jin, and J. Song, "A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology," Electronic Commerce Research, vol. 13, no. 3, pp. 329-345, 2013.   DOI
13 L. Tamilselvan and V. Sankaranarayanan, "Prevention of blackhole attack in MANET," in Proceedings of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), Sydney, Australia, 2007, pp. 21-21.
14 K. Vishnu and A. J. Paul, "Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks," International Journal of Computer Applications, vol. 1, no. 22, pp. 38-42, 2010.
15 P. Jaiswal and R. Kumar, "Prevention of black hole attack in MANET," International Journal of Computer Networks and Wireless Communications, vol. 2, no. 5, pp. 599-606, 2012.
16 N. Mistry, D. C. Jinwala, and M. Zaveri, "Improving AODV protocol against blackhole attacks," in Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, pp. 1034-1039, 2010.
17 K. S. Sujatha, V. Dharmar, and R. S. Bhuvaneswaran, "Design of genetic algorithm based IDS for MANET," in Proceedings of International Conference on Recent Trends in Information Technology, Chennai, India, 2012, pp. 28-33.
18 R. Kumar and R. Chadha, "Mitigation of black hole attack using generic algorithms and fuzzy logic," International Journal of Engineering Sciences & Research Technology, vol. 5, no. 6, pp. 818-826, 2016.
19 Sonia and H. Kaur, "Proficient and enhance the mobile ad-hoc network using routing protocol and EBFOA (Enhanced Bacteria Foraging Optimization Algorithm)," International Journal of Modern Computer Science, vol. 4, no. 6, pp. 88-94, 2016.
20 K. M. Passino, "Biomimicry of bacterial foraging for distributed optimization and control," IEEE Control Systems, vol. 22, no. 3, pp. 52-67, 2002.   DOI
21 Z. J. Haas, M. R. Pearlman, and P. Samar, "The zone routing protocol (ZRP) for ad hoc networks," The Internet Engineering Task Force, Fremont, CA, Internet Draft, 2002.
22 R. K. Bar, J. K. Mandal, and M. M. Singh, "QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack," Procedia Technology, vol. 10, pp. 530-537, 2013.   DOI
23 S. Biswas, T. Nag, and S. Neogy, "Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET," in Proceeding of Applications and Innovations in Mobile Computing (AIMoC), Kolkata, India, 2014, pp. 157-164.
24 A. Sharma, R. Singh, and G. Pandey, "Detection and prevention from black hole attack in AODV protocol for MANET," International Journal of Computer Applications, vol. 50, no. 5, pp. 1-4, 2012.   DOI
25 M. Mohanapriya and I. Krishnamurthi, "Modified DSR protocol for detection and removal of selective black hole attack in MANET," Computers and Electrical Engineering, vol. 40, no. 2, pp. 530-538, 2014.   DOI
26 K. S. Sowmya, T. Rakesh, and D. P. Hudedagaddi, "Detection and prevention of blackhole attack in MANET using ACO," International Journal of Computer Science and Network Security, vol. 12, no. 5, pp. 21-24, 2012.
27 D. G. Kariya, A. B. Kathole, and S. R. Heda, "Detecting black and gray hole attacks in mobile ad hoc network using an adaptive method," International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 1, pp. 37-41, 2012.
28 I. Woungang, S. K. Dhurandher, M. S. Obaidat, and R. D. Peddi, "A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks," Security and Communication Networks, vol. 9, no. 5, pp. 420-428, 2016.   DOI
29 S. Kumar and K. Dutta, "Intrusion detection technique for black hole attack in mobile ad hoc networks," International Journal of Information Privacy, Security and Integrity, vol. 2, no. 2, pp. 81-101, 2015.   DOI
30 M. Patel and S. Sharma, "Detection of malicious attack in MANET a behavioral approach," in Proceeding of 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 2013, pp. 388-393.
31 S. Tan and K. Kim, "Secure route discovery for preventing black hole attacks on AODV-based MANETs," in Proceedings of International Conference on ICT Convergence (ICTC), Jeju, Korea, 2013, pp. 1027-1032.
32 M. B. M. Kamel, I. Alameri, and A. N. Onaizah, "STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET," in Proceedings of IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 2017, pp. 1278-1282.
33 U. Ghosh and R. Datta, "SDRP: secure and dynamic routing protocol for mobile ad-hoc networks," IET Networks, vol. 3, no. 3, pp. 235-243, 2014.   DOI
34 T. Varshney, T. Sharma, and P. Sharma, "Implementation of watchdog protocol with AODV in mobile ad hoc network," in Proceeding of 4th International Conference on Communication Systems and Network Technologies, Bhopal, India, 2014, pp. 217-221.
35 A. Siddiqua, K. Sridevi, and A. A. K. Mohammed, "Preventing black hole attacks in MANETs using secure knowledge algorithm," in Proceedings of International Conference on Signal Processing and Communication Engineering Systems, Guntur, India, 2015, pp. 421-425.
36 A. M. Fahad and R. C. Muniyandi, "Harmony search algorithm to prevent malicious nodes in mobile ad hoc networks (MANETs)," Information Technology Journal, vol. 15, no. 3, pp.84-90, 2016.   DOI
37 J. M. Chang, P. C. Tsou, I. Woungang, H. C. Chao, and C. F. Lai, "Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach," IEEE Systems Journal, vol. 9, no. 1, pp. 65-75, 2015.   DOI
38 R. Das, B. S. Purkayastha, and P. Das, "Security measures for black hole attack in MANET: an approach," International Journal of Engineering Science and Technology, vol. 3, no. 4, pp. 2832-2838, 2011.
39 F. C. Jiang, C. H. Lin, and H. W. Wu, "Lifetime elongation of ad hoc networks under flooding attack using power-saving technique," Ad Hoc Networks, vol. 21, pp. 84-96, 2014.   DOI
40 J. Yu, H. Kang, D. H. Park, H. C. Bang, and D. W. Kang, "An in-depth analysis on traffic flooding attacks detection and system using data mining techniques," Journal of Systems Architecture, vol. 59, no. 10, pp. 1005-1012, 2013.   DOI
41 R. J. Hwang and Y. K. Hsiao, "An anonymous distributed routing protocol in mobile ad-hoc networks," The Journal of Supercomputing, vol. 66, no. 2, pp. 888-906, 2013.   DOI
42 S. Abbas, M. Merabti, D. Llewellyn-Jones, and K. Kifayat, "Lightweight Sybil attack detection in MANETs," IEEE Systems Journal, vol. 7, no. 2, pp. 236-248, 2013.   DOI
43 P. C. Tsou, J. M. Chang, Y. H. Lin, H. C. Chao, and J. L. Chen, "Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs," in Proceedings of 13th International Conference on Advanced Communication Technology (ICACT2011), Seoul, Korea, 2011, pp. 755-760.
44 P. K. Singh and G. Sharma, "An efficient prevention of black hole problem in AODV routing protocol in MANET," in Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 2012, pp. 902-906.
45 S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of cooperative black hole attack in wireless ad hoc networks," in Proceedings of the International Conference on Wireless Networks, Las Vegas, NV, 2003, pp. 570-575.
46 H. Weerasinghe and H. Fu, "Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation," in Proceedings of Future Generation Communication and Networking (FGCN 2007), Jeju, Korea, 2007, pp. 362-367.
47 S. Shahabi, M. Ghazvini, and M. Bakhtiarian, "A modified algorithm to improve security and performance of AODV protocol against black hole attack," Wireless Networks, vol. 22, no. 5, pp. 1505-1511, 2016.   DOI
48 A. A. Bhosle, T. P. Thosar, and S. Mehatre, "Black-hole and wormhole attack in routing protocol AODV in MANET," International Journal of Computer Science, Engineering and Applications (IJCSEA), vol. 2, no. 1, pp. 45-54, 2012.   DOI
49 I. Woungang, S. K. Dhurandher, R. D. Peddi, and I. Traore, "Mitigating collaborative blackhole attacks on DSR-based mobile ad hoc networks," in Proceedings of the International Symposium on Foundations and Practice of Security, Montreal, Canada, 2012, pp. 308-323.
50 J. M. Chang, P. C. Tsou, H. C. Chao, and J. L. Chen, "CBDS: a cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture," in Proceedings of 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), Chennai, India, 2011, pp. 1-5.
51 F. H. Tseng, L. D. Chou, and H. C. Chao, "A survey of black hole attacks in wireless mobile ad hoc networks," Human-centric Computing and Information Sciences, vol. 1, article no. 4, 2011.
52 K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536-550, 2007.   DOI
53 Y. Xue and K. Nahrstedt, "Providing fault-tolerant ad hoc routing service in adversarial environments," Wireless Personal Communications, vol. 29, no. 3-4, pp. 367-388, 2004.   DOI
54 G. S. Bindra, A. Kapoor, A. Narang, and A. Agrawal, "Detection and removal of co-operative blackhole and grayhole attacks in MANETs," in Proceedings of International Conference on System Engineering and Technology (ICSET), Bandung, Indonesia, 2012, pp. 1-5.
55 J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, TX, 1998, pp. 85-97.
56 A. Nadeem and M. P. Howarth, "A Survey of MANET intrusion detection & prevention approaches for network layer attacks," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2027-2045, 2013.   DOI
57 E. M. Royer and C. K. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications, vol. 6, no. 2, pp. 46-55, 1999.   DOI
58 C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), New Orleans, LA, 1999, pp. 90- 100.
59 D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Computing, vol. 353, pp. 153-181, 1996.
60 C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in Proceedings of Conference on Communications Architectures (SIGCOMM '94), Protocols and Applications, London, UK, 1994, pp. 234-244.
61 K. S. Arathy and C. N. Sminesh, "A novel approach for detection of single and collaborative black hole attacks in MANET," Procedia Technology, vol. 25, pp. 264-271, 2016.   DOI
62 P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot, "Optimized link state routing protocol for ad hoc networks," in Proceedings of the IEEE International Multi Topic Conference (INMIC): Technology for the 21st Century, 2001, pp. 62-68.
63 V. Park and S. Corson, "Temporally-ordered routing algorithm (TORA) version 1: functional specification," The Internet Engineering Task Force, Fremont, CA, Internet Draft, 1997.
64 A. Mishra, R. Jaiswal, and S. Sharma, "A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network," in Proceedings of 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 2013, pp. 499-504.
65 S. K. Dhurandher, I. Woungang, R. Mathur, and P. Khurana, "GAODV: a modified AODV against single and collaborative black hole attacks in MANETs," in Proceedings of 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 2013, pp. 357-362.
66 A. A. Aware and K. Bhandari, "Prevention of black hole attack on AODV in MANET using hash function," in Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, 2014, pp. 1-6.
67 R. J. Cai, X. J. Li, and P. H. J. Chong, "A novel self-checking ad hoc routing scheme against active black hole attacks," Security and Communication Networks, vol. 9 no. 10, pp. 943-957, 2016.   DOI
68 N. Arya, U. Singh, and S. Singh, "Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm," in Proceedings of International Conference on Computer, Communication and Control (IC4), Indore, India, 2015, pp. 1-5.
69 M. Sathish, K. Arumugam K, S. N. Pari, and V. S. Harikrishnan, "Detection of single and collaborative black hole attack in MANET," in Proceedings of International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016, pp. 2040-2044.
70 B. Cerda, E. Martinez-Belmares, and S. Yuan, "Protection from black hole attacks in communication networks," in Proceedings of the International Conference on Security and Management, Las Vegas, NV, 2017, pp. 7-11.
71 C. W. Tsai, "Incremental particle swarm optimisation for intrusion detection," IET Networks, vol. 2, no. 3, pp. 124-130, 2013.   DOI
72 S. Sharma and S. Gambhir, "CRCMD&R: cluster and reputation based cooperative malicious node detection & removal scheme in MANETs," in Proceedings of 11th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 2017, pp. 336-340.