Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2513456.2513497acmotherconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

The failure of watchdog schemes in MANET security: a case of an intelligent black-hole

Published: 07 October 2013 Publication History

Abstract

A wireless Mobile Ad-hoc Network (MANET) provides the possibility of communicating anytime anywhere in a temporary arrangement in the absent of a pre-existing network infrastructure. However, this presents new security challenges in comparison to the conventional wired and wireless networks, as it is more vulnerable to malicious attacks due to its unique features. Nodes' cooperation in MANET is a necessity for the routing protocol in use to achieve the desired routing purpose, to allow for efficient exchange of information in such temporal network. The implementation of transmission power-aware algorithms in the classical MANET routing protocols such as ad hoc on-demand distance vector (AODV), to preserve the nodes' limited battery power complicates the possibility of relying entirely on watchdog mechanisms to safeguard the network against black-hole attack. Furthermore, the watchdog's eavesdropping operation requires buffering of large amount of packets during the monitoring process. This paper proposes an algorithm which utilises cluster-heads and votes from neighbourhood nodes to detect and avoid malicious nodes. It addresses watchdog scheme's weakness in detecting black-hole attack in the presence of power-aware routing protocol, thereby increasing the overall network performance in terms of throughput and packet delivery ratio.

References

[1]
S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Mobile Ad Hoc Networking, IEEE Press, New Jersey: Wiley - Interscience, 2004.
[2]
E. O. Ochola, M. M. Eloff, and J. A. van der Poll, "Mobile Ad-hoc Network Security Challenges under AODV Routing Protocol", International Network Conference (INC 2012), pp. 113--122, July 2012.
[3]
C. Siva Ram Murthy and B. S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall, 2004.
[4]
E. O. Ochola, D. Chatelain, and A. Kurien, "Dynamic Power Control On-demand Routing Protocol", In Proceedings of the Southern African Telecommunication Networks and Application Conference (SATNAC 2007), September 2007.
[5]
A. Mishra, Security and Quality of Service in Ad Hoc Wireless Networks, Cambridge University Press, 2008.
[6]
Y. P. Singh, P. K. Singh, and J. Prakash, "A Survey on Detection and Prevention of Black Hole Attack in AODV -- based MANETs," Journal of Information, Knowledge and Research in Computer Engineering, vol. 2, no. 2, pp. 359--365, 2013.
[7]
C. Garg, and P. Rewagad, "Analysis of Black Hole and Worm Hole Attack on AODV Routing Protocol in MANET," Asian Journal of Computer Science and Information Technology, vol. 3, no. 2, pp. 9--12, 2013.
[8]
S. Djahel, F. Nait-abdesselam, and Z. Zhang, "Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges," IEEE Communications Surveys and Tutorials, vol. 13, no. 4, pp. 658--672, 2011.
[9]
I. Woungang, S. K. Dhurandher, R. D. Peddi, and I. Traore, "Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks," In: J. Garcia-Alfaro et al. (Eds.): FPS 2012, LNCS, vol. 7743, pp. 308--323, 2013.
[10]
J. A. Patil, and N. Sidnal, "Survey -- Secure Routing Protocols of MANET," International Journal of Applied Information Systems (IJAIS), vol. 5, pp. 8--15, March 2013.
[11]
B. Yang, R. Yamamoto, and Y. Tanaka, "Historical Evidence Based Trust Management Strategy against Black Hole Attacks in MANET," ICACT2012, pp. 394--399, February 2012.
[12]
S. Djahel, F. Nait-Abdesselam, and A. Khokhar, "An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol," ICC '08 Proceedings, pp. 2780--2785, May 2008.
[13]
S. Agrawal, S. Jain, and S. Sharma, "A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks," Journal of Computing, vol. 3, no. 1, January 2011.
[14]
P. Joshi, G. S. Chandel, and S. Joshi, "A Survey on: Resource Consumption Index of Denial of Service Attack in MANET," International Journal of Science Engineering and Technology Research (IJSETR), vol. 2, no. 2, pp. 314--318, February 2013.
[15]
R. Agarwal, and M. Motwani, "Survey of Clustering Algorithms for MANET," International Journal on Computer Science and Engineering, vol. 1, no. 2, pp. 98--104, December 2009.
[16]
S. Mawada, U. K. Singh, and P. Sharma, "A Novel Security Based Model for Wireless Mesh Networks," International Journal of Scientific Research in Network Security and Communication, vol. 1, no. 1, pp. 11--15, March-April 2013
[17]
E. O. Ochola, M. M. Eloff, and J. A. van der Poll, "Democratic Detection of Malicious Behaviour in MANET: A Voting Process," Proceedings of the 2013 Information Security South Africa (ISSA 2013) Conference, Johannesburg, South Africa, August 2013.

Cited By

View all
  • (2016)Beyond watchdog schemes in securing MANET's reactive protocols operating on a dynamic transmission power control technique2016 SAI Computing Conference (SAI)10.1109/SAI.2016.7556049(637-643)Online publication date: Jul-2016
  • (2015)Detection of Malicious Node Behaviour via I-Watchdog Protocol in Mobile Ad Hoc Network with DSDV Routing SchemeProcedia Computer Science10.1016/j.procs.2015.04.25249(264-273)Online publication date: 2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SAICSIT '13: Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference
October 2013
398 pages
ISBN:9781450321129
DOI:10.1145/2513456
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Amazon: Amazon.com
  • Rhodes Univ.: Rhodes University
  • IBM: IBM

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 October 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. MANET
  2. black-hole
  3. power-aware
  4. routing
  5. security
  6. watchdog

Qualifiers

  • Research-article

Conference

SAICSIT '13
Sponsor:
  • Amazon
  • Rhodes Univ.
  • IBM

Acceptance Rates

SAICSIT '13 Paper Acceptance Rate 48 of 89 submissions, 54%;
Overall Acceptance Rate 187 of 439 submissions, 43%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Beyond watchdog schemes in securing MANET's reactive protocols operating on a dynamic transmission power control technique2016 SAI Computing Conference (SAI)10.1109/SAI.2016.7556049(637-643)Online publication date: Jul-2016
  • (2015)Detection of Malicious Node Behaviour via I-Watchdog Protocol in Mobile Ad Hoc Network with DSDV Routing SchemeProcedia Computer Science10.1016/j.procs.2015.04.25249(264-273)Online publication date: 2015

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media