A Multi-bait Detection Mechanism for Black Hole Attacks in MANET
管理學院 - 資訊管理系
Department of Information Management
|Thesis Publication Year:||2020|
|Graduation Academic Year:||108|
|Keywords (in Chinese):||行動隨意網路 、動態來源路由協定 、多誘餌偵測 、黑洞攻擊|
|Keywords (in other languages):||Mobile Ad Hoc NETwork (MANET), Dynamic Source Routing (DSR), Multi-Bait Detection Mechanism (MBDM), Black Hole Attack|
|Reference times:||Clicks: 70 Downloads: 0|
|School Collection Retrieve National Library Collection Retrieve Error Report|
In the early 1970s, the idea of the Mobile Ad Hoc NETwork (MANET) was originated from a U.S. military plan. Since then, MANET have been widely used for providing communications to militaries and operations in the conventional battlefield scenarios. An on-demand protocol such as DSR is particularly suitable adopted under the military scenarios. However, common routing protocols lack in defensive procedures, and thus, make MANET vulnerable to security attacks. Black hole attack is one of the major threats to MANET that the intruders can easily implement and breach the security. Consequently, black hole attacks typically lead to severe denial of service attacks.
In this thesis, a DSR-based secure routing protocol is proposed, named Multi-Bait Detection Mechanism (MBDM). The MBDM detects, locates and isolates the black hole nodes by broadcasting bait RREQ to the network. The experiments have been done using Network Simulator 3 (NS-3). Metrics used are packet delivery ratio, throughput and average end-to-end delay. The results show that in the most common military scenario, the infantry regiment circumstances, the MBDM outperforms the DSR 2455.6% in PDR with 15% malicious nodes in the network.
 CISCO Systems, "White Paper: Mobile Ad Hoc Networks for the Military," GDSG-APAC-MANET ver3.0, 2003.
 J. Timonen, "A dynamic Tactical Command System Operation with an Ad Hoc Network", University of Turku Dep. Information Technology, 2011.
 P. Pankajini, K. K. Gadnayak and N. Panda , "MANET Attacks and their Countermeasures: A Survey," International Journal of Computer Science and Mobile Computing, p. 319 – 330, 2013.
 F. Abdel-Fattah, K. A. Farhan, F. H. Al-Tarawneh and F. AlTamimi, "Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs," Proceedings of IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, Amman, Jordan, pp. 28-33, 2019.
 R. Sheikh, M. S. Chande and D. K. Mishra, "Security issues in MANET: A review," Proceedings of 7th International Conference on Wireless and Optical Communications Networks, Colombo, Sri Lanka, pp. 1-4, 2010.
 I. Aad, J. P. Hubaux and E. W. Knightlyz, "Denial of Service Resilience in Ad Hoc Networks," Proceedings of ACM MobiCom 2004, Philadelphia, USA, pp. 202-215, 2004.
 R. H. Jhaveri, S. J. Patel and D. C. Jinwala, "DoS attacks in mobile ad-hoc networks: a survey," Proceedings of IEEE 2nd International Conference on Advanced Computing & Communication Technologies, Rohtak, Haryana, pp. 535-541, 2012.
 G. Sandhu and M. Dasgupta, "Impact of Blackhole Attack In MANET," Proceedings of International J. of Recent Trends in Engineering and Technology, Vol. 3, No. 2, New Delhi, India, 2010.
 W. Wang, B. Bhargava and M. Linderman, "Defending against Collaborative Packet Drop Attacks on MANETs," International Workshop on Dependable Network Computing and Mobile Systems, pp. 1-6, 2009.
 . A. Srivastava, D. Kumar and S. C. Gupta, "Geographic and Reactive Routing Protocols for MANET," Proceedings of IEEE European Modelling Symposium, pp. 590-594, Manchester, UK, 2013.
 T. Larsson and N. Hedman, "Routing protocols in wireless ad-hoc networks : a simulation study," [Dissertation], 1998, Available: urn:nbn:se:ltu:diva-52142
 J. M. AChoi and Y. B. Ko, "A performance evaluation for ad hoc routing protocols in realistic military scenarios," Proceedings of the 9th International Conference on Cellular and Intelligent Communications, 2004.
 N. Panda and B. K. Pattanayak, "Analysis of Blackhole Attack in AODV and DSR," International Journal of Electrical and Computer Engineering, vol. 8, pp. 3092-3102, 2018.
 A. Mukhija, "Reactive Routing Protocol for Mobile Ad-Hoc Networks," Department of Mathematics Indian Institute of Technology, Delhi, 2001.
 S. Shruthi, "Proactive routing protocols for a MANET - A review," Proceedings of International Conference onInternational Conference on IoT in Social, Mobile, Analytics and Cloud, Palladam, India, pp. 821-827, 2017.
 K. Raheja and S. K. Maakar, "A Survey on Different Hybrid Routing Protocols of MANET," International Journal of Computer Science and Information Technologies, pp. 5512-5516, 2014.
 D. Johnson, Y. Hu and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4," RFC 4728, 2007.
 C. W. Badenhop, "A Black Hole Attack Model for Reactive Ad-Hoc Protocols," Air Force Insistute of Technology, 2012.
 F. H. Tseng, L. D. Chou and H. C. Chao, "A survey of black hole attacks in wireless mobile ad hoc networks," Proceedings of Human-centric Computing and Information Sciences, pp. 1-16, 2011.
 S. Gurung and S. Chauhan, "A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability," Wireless Networks, vol. 26, pp.1981-2011, 2019.
 S. L. Dhende, S. D. Shirbahadurkar, S. S. Musale and S. K. Galande, "A survey on black hole attack in mobile ad hoc networks," Proceedings of the 4th International Conference on Recent Advances in Information Technology, pp. 1-7, Dhanbad, India, 2018.
 N. K. Gupta and K. Pandey, "Trust Based Ad-hoc On Demand Routing Protocol for MANET," Proceedings of the 6th International Conference on Contemporary Computing, pp. 225-231, Noida, India, 2013.
 H. Khattak, Nizamuddin, F. Khurshid and N. u. Amin , "Preventing black and gray hole attacks in AODV using optimal path routing and hash," Proceedings of the 10th IEEE International Conference on Networking, Sensing and Control, pp. 645-648, Evry, 2013.
 S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon and K. Nygard , "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks," Proceedings of 2003 International Conference on Wireless Networks, pp. 570-575 , Las Vegas, USA, 2003.
 R. H. Jhaveri and N. M. Patel, "A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks," Wireless Networks, vol. 21, pp. pages2781–2798, 2015.
 B. Yang, R. Yamamoto and Y. Tanaka, "Dempster-Shafer Evidence Theory Based Trust Management Strategy against Cooperative Black Hole Attacks and Gray Hole Attacks in MANETs," Proceedings of the 16th International Conference on Advanced Communication Technology, pp. 223-232, Pyeongchang, South Korea, 2014
 M. Mohanapriya and I. Krishnamurthi, "Modified DSR protocol for detection and removal of selective black hole attack in MANET," Computers and Electrical Engineering, vol. 40, pp. 530-538, Tamilnadu, India, 2014.
 K. Dhanalakshmi, B. Kannapiran and A. Divya, "Enhancing Manet Security Using Hybrid Techniques in Key Generation Mechanism," Proceedings of International Conference on Electronics and Communication Systems, pp. 1-5, Coimbatore, India, 2014.
 A. D. Patel and K. Chawda, "Dual Security Against Grayhole Attack in MANETs," Intelligent Computing, Communication and Devices, pp 33-37, New Delhi, India, 2014.
 J. M. Chang, P. C. Tsou, I. Woungang, H. C. Chao and C. F. Lai, "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach," IEEE Systems Journal, vol. 9, pp. 65-75, 2015.
 N. Sharma and A. S. Bisen, "Detection As Well As Removal Of Black hole And Gray hole Attack In MANET," International Conference on Electrical, Electronics, and Optimization Techniques, pp. 3736-3739, Chennai, India, 2016.
 A. Soysal, A. Krotov , A. Deepak and B. Herman, "NS-3 Network Simulator," [Online], 2018, Available: https://www.nsnam.org/.