INFORMATION CHANGE THE WORLD

International Journal of Modern Education and Computer Science (IJMECS)

ISSN: 2075-0161 (Print), ISSN: 2075-017X (Online)

Published By: MECS Press

IJMECS Vol.4, No.8, Aug. 2012

A Study of Black Hole Attack on MANET Performance

Full Text (PDF, 325KB), PP.47-53


Views:176   Downloads:4

Author(s)

C. K. Nagpal,Chirag Kumar,Bharat Bhushan,Shailender Gupta

Index Terms

Black Hole,Network,Performance Parameters,Security

Abstract

Mobile Ad hoc Network (MANET) is a self-organized wireless network, consisting of nodes (mobile devices) responsible for its creation, operation and maintenance. The communication in the MANET is of multihop in nature due to absence of any fixed infrastructure. An attacker may intrude easily into MANET by posing as legitimate intermediate node and present various types of security attacks on data exchanges taking place between source and destination. In this paper we study the impact of presence of black hole node on MANET performance on the basis of reachability, hop count, neighbor node density and path optimality. We observe that as the percentage of black hole nodes increases, the MANET performance degrades significantly.

Cite This Paper

C. K. Nagpal,Chirag Kumar,Bharat Bhushan,Shailender Gupta,"A Study of Black Hole Attack on MANET Performance", IJMECS, vol.4, no.8, pp.47-53, 2012.

Reference

[1]Charles E. Perkins, "Mobile Ad-Hoc Networks," Addison-Wesley(2000).

[2]J. E. Wieselthier, E. Altman, A. Ephremides, J. P. Macker, H. B. Russell, M. Steenstrup, and S. B. Wicker," Wireless ad hoc networks – part II", IEEE Journal on SAC , Volume 23, Number 3, March 2005.

[3]Giorgos Papastergiou, Ioannis Psaras , Vassilis Tsaoussidis," Deep-Space Transport Protocol: A Novel Transport Scheme for Space DTNs", Computer Communications Volume 32, Issue 16, 15 October 2009, Pages 1757–1767 , Elsevier.

[4]Hany Samuel,Weihua Zhuang,Bruno Preiss,"DTN Based Dominating Set Routing for MANET in Heterogeneous Wireless Networking", Journal Mobile Networks and Applications Volume 14 Issue 2, April 2009 Pages 154 - 164.

[5]J. Mackar and S. Corson, RFC 2501, "Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations", IETF 1999.

[6]Chim Yuen Chong, Raymond Seah Kwang Wee, Sim Soon Lian, Tan Jia Hui,"Moblie Ad hoc Networking",http://www.dsta.gov.sg/DSTA_horizons/2006/Chapter_7. Htm.

[7]L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J. P. Hubaux, J. Y. Le Boudec, "Self- Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes," IEEE Communications Magazine, Vol. 39, No. 6, June 2001.

[8]L. Buttyán, J.-P. Hubaux, "Nuglets: a Virtual Currency to Stimulate Cooperation in Self- Organized Mobile Ad Hoc Networks," Technical report No. DSC/2001/001, Swiss Federal Institution of Technology, Lausanne, January 2001. http://icawww.epfl.ch/hubaux/.

[9]L. Buttyán, J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Technical Report No. DSC/2001/046, Swiss Federal Institution of Technology, Lausanne, 31 August 2001. http://icawww.epfl.ch/hubaux/.

[10]Shailender Gupta, C. K. Nagpal and Charu Singla,"IMPACT OF SELFISH NODE CONCENTRATION IN MANETS",International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 2, April 2011.

[11]H Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, "Security in mobile ad hoc networks: Challenges and solutions" (2004). IEEE Wireless Communications. 11 (1), pp. 38-47.

[12]Hao Yang,Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang,"Security in mobile ad hoc networks: challenges and solutions",Wireless Communications, IEEE Feb 2004.

[13]Hongmei Deng, Wei Li, D.P.Agrawal,"Routing security in wireless ad hoc networks",Communications Magazine, IEEE Oct 2002.

[14]B.Kannhavong, H.Nakayama, Y.Nemoto, N.Kato, A.Jamalipour,"A survey of routing attacks in mobile ad hoc networks",Wireless Communications, IEEE October 2007.

[15]Hoang Lan Nguyen,Uyen Trang Nguyen,"A study of different types of attacks on multicast in mobile ad hocnetworks",http://dx.doi.org/10.1016/j.adhoc.2006.07.005Volume 6, Issue 1, January 2008, Pages 32–46.

[16]Khin Sandar Win,"Analysis of Detecting Wormhole Attack in Wireless Networks",World Academy of Science, Engineering and Technology 48 2008.

[17]Yih-Chun Hu, A. Perrig, D.B.Johnson,"Wormhole attacks in wireless networks",Selected Areas in Communications, IEEE Journal 2006.

[18]N.Song, L.Qian, X. Li,"Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach",Parallel and Distributed Processing Symposium, 2005. 

[19]A. Patcha, A. Mishra,"Collaborative security architecture for black hole attack prevention in mobile ad hoc networks",Radio and Wireless Conference, 2003. RAWCON '03.

[20]Bo Sun, Yong Guan, Jian Chen, U.W.Pooch,"Detecting black-hole attack in mobile ad hoc networks",Personal Mobile Communications Conference, 2003. 5th European (Conf. Publ. No. 492).

[21]L. Tamilselvan, V. Sankaranarayanan,"Prevention of Blackhole Attack in MANET",Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on 27-30 Aug. 2007.

[22]S. Marano, V. Matta, L. Tong,"Distributed Detection in the Presence of Byzantine Attack in Large Wireless Sensor Networks",Military Communications Conference, 2006. MILCOM 2006. IEEE.

[23]S. Dokurer, Y. M. Ert , C. E. Acar," Performance analysis of ad-hoc networks under black hole attacks", SoutheastCon, 2007. Proceedings. IEEE.

[24]S. Sharma, Rajshree, R. P. Pandey, V. Shukla, " Bluff-Probe Based Black Hole Node Detection and prevention", Advance Computing Conference, 2009. IACC 2009, IEEE International. 

[25]M. Medadian, M. H. Yektaie, A. M. Rahmani, "Combat with Black hole attack in AODV routing protocol in MANET", First Asian Himalayas International Conference on 3-5 Nov. 2009.

[26]V. Palanisamy, P. Annadurai, S. Vijayalakshmi," Impact of black hole attack on multicast in ad hoc network (IBAMA)", Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference on 28-29 Dec. 2010.

[27]N. Sharma, A. Sharma," The Black-Hole Node Attack in MANET", Second International Conference on Advanced Computing & Communication Technologies 2012.

[28]Okoli Adaobi, Ejiro Igbesoko, Mona Ghassemian," Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks", New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on 7-10 May 2012.