You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/261494792

DoS Attacks in Mobile Ad Hoc Networks: A Survey

Conference Paper · January 2012


DOI: 10.1109/ACCT.2012.48

CITATIONS READS

147 1,659

3 authors:

Rutvij H Jhaveri Sankita J. Patel


Pandit Deen Dayal Petroleum University Sardar Vallabhbhai National Institute of Technology
81 PUBLICATIONS   651 CITATIONS    25 PUBLICATIONS   285 CITATIONS   

SEE PROFILE SEE PROFILE

Devesh Jinwala
Sardar Vallabhbhai National Institute of Technology
125 PUBLICATIONS   827 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Cloud Computing View project

IMAGE PROCESSING View project

All content following this page was uploaded by Rutvij H Jhaveri on 19 May 2016.

The user has requested enhancement of the downloaded file.


DoS Attacks in Mobile Ad-hoc Networks: A Survey

Rutvij H. Jhaveri Sankita J. Patel Devesh C. Jinwala


Computer/IT Engineering Department Computer Engineering Department Computer Engineering Department
Shri S’ad Vidya Mandal Institute of Sardar Vallabh National Institute of Sardar Vallabh National Institute of
Technology Technology Technology
Bharuch 392-001, Gujarat, India Surat 395-007, Gujarat, India Surat 395-007, Gujarat, India
rutusoft@rediffmail.com sjp@coed.svnit.ac.in dcj@coed.svnit.ac.in

Abstract—MANETs have unique characteristics like dynamic prevention. Finally conclusion and future directions are given
topology, wireless radio medium, limited resources and lack of in Section V.
centralized administration; as a result, they are vulnerable to
different types of attacks in different layers of protocol stack.
Each node in a MANET is capable of acting as a router. Routing
II. ROUTING IN MANETS
is one of the aspects having various security concerns. In this As each mobile node works as a router in MANET, routing
paper, we will present survey of common Denial-of-Service (DoS) overhead gets reduced compared to wired networks. Sender
attacks on network layer namely Wormhole attack, Blackhole and receiver nodes can communicate with each other if and
attack and Grayhole attack which are serious threats for only if they are within the communication range of each other;
MANETs. We will also discuss some proposed solutions to detect if they are not, the sender has to send message through
and prevent these attacks. As MANETs are widely used in many intermediate nodes. Due to unpredictable and dynamic nature
vital applications, lots of research work has to be done to find of MANET, nodes do not have any prior knowledge about
efficient solutions against these DoS attacks that can work for topology; therefore, nodes have to determine the topology. A
different routing protocols. node advertises its presence and listens to advertisements of its
Keywords-MANETs; Security; DoS Attacks; Wormhole Attack;
neighbors. This is how a node discovers its neighbors as well
Blackhole Attack; Grayhole Attack as ways to reach those. Routing is a big challenge in the
environment where nodes are moving very frequently and
movement of a host may result in change in the route [1]. Due
I. INTRODUCTION to these various constraints along with vibrant topology, role of
A MANET is a group of mobile nodes wishing to routing protocols is even more challenging.
communicate with each other via wireless shared medium; it is The primary objective of a routing protocol must be to set
a highly adaptable network that can change its form depending up an optimal route that has minimal overhead and consume
on the requirement. As each node has limited communication minimum bandwidth. Types of MANET routing protocols [1,
range, it acts as a router to forward packets to another node. A 3] along with their characteristics and examples are shown in
MANET is rapidly deployable and highly adaptive network; TABLE I.:
without any pre-defined infrastructure and therefore, line of
defense is very unclear. Mobile nodes use radio broadcast TABLE I. ROUTING PROTOCOLS
medium for communication. Therefore, MANETs have Type Characteristics Examples
applications in conference meetings, virtual classrooms, • Routes are computed
automated battlefields, military, rescue systems, voting prior to requirement
systems, mobile offices, vehicular computing, electronic Proactive DSDV, OLSR,
(Table-driven) • Periodical updation WRP, CGSR, FSR
payments from anywhere and many more [1]. and distribution of
On the other side, the inherent characteristics of MANET routing information
leads to some major issues such as power constraints, radio • Routes are discovered,
when demanded, by
interference, routing protocols, IP addressing, security, Reactive flooding route request AODV, DSR,
mobility management, service discovery, bandwidth (On-demand) • No requirement of ACOR, ABR
constraints and Quality of Services (QoS) [2]. Among all distribution of routing
research issues, security has been a prime concern among information
researchers. In this paper, we have surveyed some dangerous • Combination of good TORA, ZRP,
DoS attacks against MANETs and their proposed solutions characteristics of ARPAM, OORP,
Hybrid
proactive and reactive HSR, CGSR,
given by various research people. The remainder of paper is protocols LANMAR
organized as follows. Section II introduces to routing and type
of routing protocols in MANET. Section III addresses security
concerns along with types of attacks as well as examples of The main advantage of proactive protocols is that a route
attacks on different layers of protocol stack. Section IV can be selected immediately without any kind of holdup; but
describes DoS attacks like Wormhole, Blackhole and Grayhole maintaining large amount of data for routing information with
attacks along with proposed solutions for their detection and higher bandwidth and slow reaction on failures are major
drawbacks. Reactive protocols consume less bandwidth and
effective in route maintenance; but they require higher time for A. Wormhole attack
route discovery and sometimes excessive flooding may lead to The Wormhole attack is a kind of tunneling attack which is
network congestion. Efficiency of hybrid protocols may vary extremely dangerous and damaging to defend against even
with number of nodes and the amount of traffic decides the though the routing information is confidential, authenticated or
reaction to demand. encrypted [5]. It can be mounted without prior knowledge of
III. SECURITY CONCERNS routing protocols and without compromising nodes [8]. It is
relatively easy to deploy but exceedingly hard to detect.
Due to lack of trusted centralized administration, limited Usually Wormhole attack is launched by two malicious nodes
bandwidth, limited power, wireless links, dynamic topology (worms) connected via a high-speed wired or wireless link
and easy eavesdropping MANETs are more susceptible to called Wormhole link or tunnel. Nodes outside each other’s
security attacks than existing conventional networks [4]. A communication range have to communicate via intermediate
network’s goals are availability, integrity, confidentiality, nodes in a multi-hop way. Worms are placed at very powerful
authentication and non-repudiation. An attacker can violate positions in the network. They encapsulate data packets and
them by passively or actively attacking on MANETs [5]. falsify the route lengths [6]. One worm records packets at one
TABLE II. shows the characteristics and examples of active location and replays them to another location to peer worm,
and passive attacks. Both active and passive attacks can be giving impression to nodes in both groups that they are
launched on any layer of the network protocol stack. Table III. immediate neighbors [8]. Many packets in the network would
[6, 7] shows some examples of attacks on different layers. be delivered through these worms. If the attacker carries out the
tunneling reliably and truthfully then it can work very
TABLE II. ROUTING ATTACKS
efficiently in connecting the network [6], but the worms can
Type of
Characteristics Examples
drop delivered messages and acquire statistical data of traffic
Attack by investigating message traffic [9]. To minimize delay, the
• Obtains information without Traffic analysis, attacker may forward each bit through the Wormhole link
Passive disturbing normal network traffic
Attacks operation monitoring and
without waiting for the entire packet to be received [6]. It is
• Difficult to detect eavesdropping generally assumed that Wormhole attacks do not alter integrity
• Can be internal (attacker within of captured packets [10]. More the number of end-to-end paths
the network) or external (attacker Modification, passing through Wormhole link, stronger the Wormhole attack
Active
outside the network) impersonation, [11].
• Can disturb network operation by fabrication,
Attacks 1) Operation of Wormhole Attack:As shown in Figure 1.,
modifying or deleting information, jamming and
injecting a false message or message replay two malicious nodes X and Y launch the Wormhole attack on
impersonating a node the MANET. X and Y are connected via a high-speed
Wormhole link that tunnels traffic between nodes S and D
TABLE III. ATTACKS ON DIFFERENT LAYERS OF PROTOCOL STACK
[12]. As mentioned in [13], when node S wishes to
Layer Examples of Attacks communicate with node D, normally it takes multiple hops for
Application Layer • Repudiation a packet to travel between them. Though in the presence of
worms X and Y, S and D start believing that they are
Transport Layer • Session hijacking
immediate neighbors. Packets traveling through Wormhole
• DoS attacks: Wormhole,
Blackhole, Grayhole, Byzantine,
link travel faster to the destination than packets traveling
Resource Consumption attack, through multiple hops in the MANET. X and Y do not alter
Rushing attack the packet header and falsify the route lengths. Thus,
Network Layer • Information Disclosure Wormhole attack can prevent normal intermediate nodes from
• Routing attacks: Routing table
overflow, Routing table poisoning, correctly incrementing the metric used to determine path
Packet replication, Route cache lengths [6]. Packets received by X are replayed through
poisoning Wormhole link to Y and vice versa. X and Y can now
• Denial of Service (DoS), SYN selectively drop data packets or analyze traffic and disrupt the
Multiple Layers flooding, Impersonation, Device
tampering network’s communication. Malicious nodes X and Y along
with the Wormhole link are not visible in the route; and also
the Wormhole attacker is hidden from the higher layers.
In this paper, our prime focus will be on some of the DoS
Therefore, detection of Wormhole attack is exceedingly tough.
attacks that come under the category of network layer attacks.
2) Detection/Prevention of Wormhole Attack: Table IV.
IV. DOS ATTACKS shows brief discription of various approaches for detection or
DoS attacks are active attacks in which malicious nodes prevention against a Wormhole attack and their limitations.
generate false messages in order to disrupt the network’s
operations or to consume other nodes’ resources. We will
discuss Wormhole, Blackhole and Grayhole attacks as well as
existing solutions to detect and fight against them.
replies to the requesting node before the actual node replies, a
bogus route will be created. Therefore packets are not
forwarded to the specified destination node; instead, the
malicious node intercepts the packets, drops them and thus,
absorbs network traffic [23].

Figure 1. Wormhole attack

TABLE IV. WORMHOLE DETECTION/PRVENTION TECHNIQUES

Approach Description Limitations


Ensuring that the receiver must
Geographical Limitations of
be within certain distance from
Leashes[14] GPS technology
the sender
All nodes require
Temporal tightly Figure 2. Blackhole attack
Time stamp given for packet
Leashes[14] synchronized
clocks 1) Operation of Blackhole Attack:
Each intermediate node An example of Blackhole attack against AODV protocol
appends time and location (Ad-hoc On demand Distance Vector) is shown in Figure 2.
End-to-end information and Receiver Limitations of [24]. Suppose source S wants to communicate with node D. S
Leashes [15] authenticates time and location GPS technology initiates route discovery process by broadcasting route request
information of a packet using
symmetric key packets (RREQ) to its neighbors. The destination node D or
Identifying highest frequency Works only with any intermediate nodes having fresh route to the destination
Statistical link through analyzing relative multimpath on can give reply by sending reply packet (RREP) to S.
Analysis [16] frequency of each link demand Considering no intermediate nodes have a fresh route to D,
appearing in obtained routes protocols they forward request packets towards destination. As X is a
Instead of one-hop, two-hop
routing information is obtained
Works only for malicious node, it doesn’t forward the request packet ahead;
LiteWorp [17]
by nodes; now nodes know
stationary instead, it falsely replies to S indicating that it has a valid fresh
networks route to D. Thus, reply packet from X reaches to S ahead of
their neighbors’ neighbor
Location Aware Guard Nodes reply packets from other neighbors of S. Therefore, S
(LAGNs) send hashed considers sending packets to D via X considering that X has a
Localization messages; if Wormhole is Not applicable to shortest route to D. Now X absorbs all packets forwarded
[18] present, a node detects mobile networks
inconsistencies in the message
from S to D. This is how a Blackhole attack is setup.

Each pair of nodes determines Not applicable to


2) Detection/Prevention of Blackhole Attack: Various
Directional approaches have been proposed to defend against a Blackhole
the direction of received signals network without
Antennas
[19,20]
from neighbor; if directions directional attack; Table V. briefly mentions some of them along with
match, relation is set antennas their limitations.
In a sensor network, each
sensor senses distance of its
neighbors and sends that Mobility and
Network TABLE V. BLACKHOLE DETECTION/PREVENTION TECHNIQUES
information to centralized terrains not
Visualization
controller from which it studied for this
[21] Approach Description Limitations
calculates topology; With no solution
Wormhole, topology more or Verifying the authenticity of
Reply Packet
less remains flat node sending reply packet and Longer time
Authenticity
wait for reply packets from more delay
[22]
than two nodes
B. Blackhole attack Every node keeps two additional The malicious
small-sized tables: one to keep node can listen
Blackhole attack is another type of DoS attack that Last-Packet- last-packet-sequence-numbers to the channel
generates and disseminates fabricated routing information. As Sequence- sent to every node and second to and update the
mentioned in [22], a malicious node, exploiting the flooding- Numbers [22] keep last-packet-sequence- tables for the last
based routing protocol, advertises itself as having a valid numbers received from every packet sequence
node number
shortest route to the destined node. If the malicious node
Approach Description Limitations Approach Description Limitations
Adds some Information between source and destination with more
Using common neighbors,
Common routing control (DRI) and by identifying and isolating percentage of
acting as watchdogs, to detect
Neighbor overhead and cross cooperative Blackhole nodes; Blackhole nodes
attack and discover a new route
Listening [25] works in specific checking This approach uses modified
if there is a Blackhole present
circumstances using FREQ version of AODV; It introduces
The intermediate node requests and FREP DRI table and cross checking
its next hop to send a [34] using Further Request (FREQ)
Route confirmation message to the Doesn’t work if and Further Reply (FREP).
Confirmation source. After receiving both two consecutive Works better than other similar
Request- route reply and confirmation nodes are kind of approaches
Reply [26] message, the source determines malicious
the validity of path according to
its policy C. Grayhole attack
Dynamic Analyzing differences between
Training sequence numbers of received False positives Grayhole attack is an extension of Blackhole attack in
Method [27] reply packets which a malicious node’s behavior is exceptionally
Check path containing repeated
Increases
unpredictable. There are three types of Grayhole attacks [5]. In
SAODV [24]
next hop node to destination; if
average end-to- first, the malicious node may drop packets from certain nodes
there is no repeated node, select while forwards all other packets. In second type, a node may
end delay
random path
To keep information of sequence
behave maliciously for a certain time, but later on it behaves
number of destination node and
Higher number just like other ordinary nodes. Third type of attack is the
of control combination of both attacks i.e. the malicious node may drop
addresses of intermediate nodes
AODV- packets; delay in
SABH [28]
in RREQ; when a node receives
route discovery
packets from specific nodes for certain time only, later it
RREP it should check the behaves as a normal node. Due to these characteristics,
process in some
address of the sender in its local detection of Grayhole attacks is not an easy task. A Grayhole
scenarios
table
After receiving first RREP, the attack can disturb route discovery process and degrade
Rise in average network’s performance [35].
source node waits for a specific
end-to-end delay
time period; for this period
and normalized 1) Operation of Grayhole Attack: Figure 3. (a) shows a
MOSAODV source node saves all received
routing
[29] RREP message in a table;
overhead;
MANET using AODV routing protocol. Node X intially
Source node discards all behaves as an ordinary node and forwards all packets from
Heuristic
RREPs having very high
sequence number
approach source S to the specified destination D. After some time, as
After specific time interval a shown in Figure 3. (b), node X behaves maliciously and starts
Increases
threshold sequence number is dropping packets sent by source S to the destination D. After
average end-to-
DPRAODV calculated; if RREP has
[30] sequence number greater than
end delay and some time, X acts as a normal node as earlier.Thus, X behaves
normalized maliciously for certain time period. As AODV doesn’t have
the threshold, it is considered
routing overhead
as a malicious node any security mechanism, malicious nodes can perform many
The intermediate node attacks just by not following the protocol rules.
Data Routing generating RREP sends next
Information hop node and its DRI table
Cross checking
(DRI) and entry; cross checking is done
cost is more
cross on intermediate node; the
checking [31] source node uses reliable node
to send the packet
Each intermediate node sends
back the next hop information
while sending back an RREP.
When the source node receives
May not work
Further the RREP, it extracts the next
against
Request and hop information from it then
cooperative
Further Reply sends a Further Request to the
Blackhole
[32] next hop to verify that it has a
attacks
route to the intermediate node
who sends back the Further
Reply message, and that it has a
route to the destination node.
Each node maintains an
estimation table containing
Cannot detect
status information about nodes
within the power range. One
cooperative (a)
Voting Blackholes; the
node detects suspicious node
System [33] voting system is
and notifies that to neighbors.
not considered
The nodes cooperatively vote
good
for the consideration of the
suspicious node as Blackhole.
Data Routing It discovers the secure route May not work
Approach Description Limitations
of nodes that are consistently misbehavior
misbehaving. Selecting proper is addressed;
threshold of misbehavior allows It assumes
discrimination between well- bidirectional
behaved and misbehaved nodes; it communicatio
also provides robustness against n symmetry in
various grades of mobility in a every direct
network that is affected by link between
Grayhole / Blackhole attacks. a pair of
nodes;
assumes
reliability of
MAC layer
protocol;
assumes all
nodes adapted
with wireless
interfaces
supporting
(b) promiscuous
mode
operation.
Figure 3. Grayhole Attack
Trust-based approach that uses
It is used only
2) Detection/Prevention of Grayhole Attack: Table VI. passive acknowledgement as it is
for detecting
simplest; Uses promiscuous mode
briefly describes various approaches for detection or to monitor the channel that allows
packet
prevention against a Grayhole attack and their limitations. forwarding
a node to identify any transmitted
misbehavior;
packets irrelevant of the actual
monitoring
TABLE VI. GRAYHOLE DETECTION/PREVENTION TECHNIQUES destination that they are intended
overall traffic
ST-AODV [40] for; thus, a node can ensure that
would be a
Approach Description Limitations packets it has sent to a
better choice
Each node involved in a session neighboring node for forwarding
than
must create a proof that it has are indeed forwarded; routing
Creating Proof monitoring
received the message; When choices are made based on trust as
Algorithm, only one
source node suspects some May not well as hop-count, such that the
Check up node’s
misbehavior, Checkup algorithm detect all selected next hop gives the
Algorithm and requests.
checks intermediate nodes; malicious shortest trusted path.
Diagnosis Assumption is
According to the facts returned nodes
Algorithm made that
by the Checkup algorithm, it
[35,36] nodes have no
traces the malicious node by
Diagnosis algorithm energy
It uses two strategies for
May not work constraints
detecting misbehaving nodes:
Source and destination nodes with many Channel-aware and source
hop-by-hop loss observation by
perform end-to-end checking to malicious Detection and
next hop (downstream node) and
determine whether the data nodes; nodes Algorithm [41] destination
traffic monitoring by previous
packets have reached the must be know the
End-to-end hop (upstream node).
destination or not. If the capable of forwarding
Checking [37] path and IDs
checking fails then the backbone finding their
network initiates a protocol for positions of forwarding
detecting single or cooperative when they nodes.
malicious nodes enter the One-way hash code is added to
network the data packets; when receiver
Before sending any block, source receives packet, it checks the
sends a prelude message to correctness of it by finding The solution
destination to alert it; neighbors match of hash code; for correct is not tested
Simple
monitor flow of traffic; after end data packet, it sends ACK to with higher
acknowledgem
of transmission, destination sender which checks the ACK is density of
ent and flow
sends postlude message Analysis of received within specific time; for nodes and
Prelude and conservation
containing the number of packets the proposed incorrect packet receiver sends adds to the
Postlude [2]
received. If the data loss is out solution has CONFIDENTIALITY LOST routing
Messaging [38] through intermediate nodes and overhead.
of tolerable range, initiate the not been done
process of detecting and sender switches to alternative
removing all malicious nodes by intermediate node to send
aggregating response from packets.
monitoring nodes and the ABM estimates the suspicious It is assumed
network Anti-Blackhole value of a node, according to the that a node ID
Flow Detecting packet forwarding Mechanism amount of abnormal difference cannot be
Conservation misbehavior by the principle of Only packet (ABM) [42] between RREQs and RREPs forged, and a
[39] flow conservation and accusation forwarding transmitted from the node; All block
Approach Description Limitations [10] Dang Quan Nguyen and Louise Lamont, “A Simple and Efficient
nodes perform ABM; with the message, sent Detection of Wormhole Attacks”, New Technologies, Mobility and
prerequisite that intermediate by an Security, November 2008, pp. 1-5.
nodes are forbidden to reply to IDS node, [11] Viren Mahajan, Maitreya Natu, and Adarshpal Sethi, “Analysis of
RREQs, if an intermediate node is cannot be Wormhole Intrusion Attacks in MANETs”, Military Communications
not the destination and never modified Conference, November 2008, pp.1-7.
broadcasts a RREQ for a specific [12] Maria A. Gorlatova, Peter C. Mason, Maoyu Wang, Louise Lamont,
route, but forwards a RREP for Ramiro Liscano, ”Detecting Wormhole Attacks in Mobile Ad
the route, then its suspicious value HocNetworks through Protocol Breaking and Packet Timing Analysis”,
will be increased by 1 in the Military Communications Conference, October 2006, pp. 1-7.
nearby node’s suspicious node [13] Mani Arora, Rama Krishna Challa and Divya Bansal, “Performance
table. When the suspicious value Evaluation of Routing Protocols Based on Wormhole Attack in Wireless
of a node exceeds a threshold, a Mesh Networks”, Second International Conference on Computer and
Block message is broadcasted by Network Technology, 2010, pp. 102-104.
the detected node to all nodes in [14] Yih-Chun Hu, Adrian Perrig,and David B. Johnson, “Wormhole Attacks
the network in order to isolate the in Wireless Networks”, IEEE Journal on Selected Areas in
suspicious node cooperatively. Communications, vol. 24 no. 2, February 2006, pp. 370-380.
[15] W. Weichao,B. Bharat, Y. Lu and X. Wu, “Defending against Wormhole
V. CONCLUSION AND FUTURE WORK Attacks in Mobile Ad Hoc Networks”, Wiley Interscience, Wireless
Designs of most of the routing protocols are based on the Communication and Mobile Computing, January 2006.
requirement of frequently changing topology of the MANET, [16] L. Qian, N. Song, and X. Li, “Detecting and Locating Wormhole Attacks
but security issues have been left ignored. This paper provides in Wireless Ad Hoc Networks Through Statistical Analysis of Multi-
path,” IEEE Wireless Commuunication. and Networking Conference,
brief view about routing as well as security concerns for 2005.
MANET. We described operations of DoS attacks like [17] I. Khalil, S. Bagchi, N. B. Shroff,” A Lightweight Countermeasure for
Wormhole, Blackhole and Grayhole attacks and surveyed some the Wormhole Attack in Multihop Wireless Networks”, International
of the existing solutions for each of them. DoS attacks breach Conference on Dependable Systems and Networks, 2005.
network’s security and disrupt network operations. More [18] L. Lazos, R. Poovendram, C. Meadows, P. Syverson, L.W. Chang,
damage can be done when malicious nodes act cooperatively. “Preventing Wormhole Attacks on Wireless Ad Hoc Networks: a Graph
Extensive research ought to be carried out for efficient Theoretical Approach”, IEEE Communication Society, WCNC 2005.
discovery and prevention of these DoS attacks, especially, [19] L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole
Grayhole and Blackholeattacks. Attacks”, 11th Network and Distributed System Security Symposium,
pp.131-141, 2003.
[20] L.Lazos, R. Poovendran, “Serloc: Secure Range-Independent
REFERENCES Localization for Wireless Sensor Networks”,ACM Workshop on
Wireless Security, pp. 21-30, October 2004.
[1] Nadia Qasim, Fatin Said, and Hamid Aghvami, “Performance Evaluation
of Mobile Ad Hoc Networking Protocols”, Chapter 19, pp. 219-229. [21] W. Wang, B. Bhargava, “Visualization of Wormholes in sensor
networks”, ACM workshop on Wireless Security, pp. 51-60, 2004.
[2] G.S. Mamatha and S.C. Sharma, “A Robust Approach to Detect and
Prevent Network Layer Attacks in MANETS”, International Journal of [22] Mohammad Al-Shurman, Seong-Moo Yoo and Seungjin Park, “Black
Computer Science and Security, vol. 4, issue 3, Aug 2010, pp. 275-284. Hole Attack in Mobile Ad Hoc Networks”, ACMSE, April 2004, pp.96-
97.
[3] Preetam Suman, Dhananjay Bisen, Poonam Tomar, Vikas Sejwar and
Rajesh Shukla, “Comparative study of Routing Protocols for Mobile Ad- [23] Anu Bala, Munish Bansal and Jagpreet Singh, “Performance Analysis of
Hoc Networks”, International Journal of IT & Knowledge Management, MANET under Blackhole Attack”, First International Conference on
2010. Networks & Communications, 2009, pp. 141-145.
[4] Hoang Lan Nguyen and Uyen Trang Nguyen, ”Study of Different Types [24] Latha Tamilselvan and Dr. V Sankaranarayanan, “Prevention of
of Attacks on Multicast in Mobile Ad Hoc Networks”, International Blackhole Attack in MANET”, The 2nd International Conference on
Conference on Networking, International Conference on Systems and Wireless Broadband and Ultra Wideband Communications, 2007, pp.
International Conference on Mobile Communications and Learning 21-26.
Technologies, April 2006, pp. 149-149. [25] Geng Peng and Zou Chuanyun,”Routing Attacks and Solutions in Mobile
[5] Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar and Bhavin I. Shah, Ad hoc Networks”, International Conference on Communication
“MANET Routing Protocols and Wormhole Attack against AODV”, Technology, November 2006, pp. 1-4.
International Journal of Computer Science and Network Security, vol. [26] S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc
10 No. 4, April 2010, pp. 12-18. Networks”, International Conference on Parallel Processing
[6] N. Shanthi, Dr. Lganesan and Dr.K.Ramar, “Study of Different Attacks on Wowrkshops, August 2002.
Multicast Mobile Ad hoc Network”, Journal of Theoretical and Applied [27] Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato1, Abbas Jamalipour,
Information Technology, December 2009, pp. 45-51. and Yoshiaki Nemoto1,” Detecting Blackhole Attack on AODV-based
[7] Abhay Kumar Rai, Rajiv Ranjan Tewari and Saurabh Kant Upadhyay , Mobile Ad Hoc Networks by Dynamic Learning Method”, International
“Different Types of Attacks on Integrated MANET-Internet Journal of Network Security, vol..5 no..3, Nov. 2007, pp.338–346.
Communication”, International Journal of Computer Science and [28] Fatima Ameza, Nassima Assam and Rachid Beghdad, “Defending
Security, vol. 4 issue 3, July 2010, pp. 265-274. AODV Routing Protocol Against the Black Hole Attack”, International
[8] Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos, Journal of Computer Science and Information Security, Vol. 8, No.2,
“TrueLink: A Practical Countermeasure to the Wormhole Attack in 2010, pp.112-117.
Wireless Networks”, 14th IEEE International Conference on Network [29] Nital Mistry, Devesh C. Jinwala and Mukesh Zaveri, “Improving AODV
Protocols, November 2006, pp.75-84. Protocol against Blackhole Attacks”, International Multiconference of
[9] Mahdi Taheri, Dr. majid naderi, Mohammad Bagher Barekatain, “New Engineers and Computer Scientists 2010, vol. 2, March 2010.
Approach for Detection and defending the Wormhole Attacks in [30] Payal N. Raj and Prashant B. Swadas,”DPRAODV: A dynamic learning
Wireless Ad Hoc Networks”, 18th Iranian Conference on Electrical system against black hole attack in AODV based Manet”, International
Engineering,, May 2010, pp. 331-335. Journal of Computer Science Issues, Vol. 2, Issue 3, 2010, pp: 54-59.
[31] Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon International Conference on Communications and Networking in China,
and Kendall Nygard,” Prevention of Cooperative Black Hole Attack in August 2007, pp. 366-370.
Wireless Ad Hoc Networks”. [37] Piyush Agrawal, R. K. Ghosh and Sajal K. Das, “Cooperative Black and
[32] Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing security in Gray Hole Attacks in Mobile Ad Hoc Networks”, 2nd international
Wireless Ad-hoc Network”,IEEE Communications Magazine, Issue 40, conference on Ubiquitous information management and communication,
2002, pp 70–75. 2008, pp.310-314.
[38] Sukla Banerjee, “Detection/Removal of Cooperative Black and Gray
[33] Chang Wu Yu, Tung-Kuang Wu, Rei Heng Cheng, and Shun Chao Hole Attack in Mobile Ad-Hoc Networks”, World Congress on
Chang,“A Distributed and Cooperative Black Hole Node Detection and Engineering and Computer Science , October 2008, pp. 337-342.
Elimination Mechanism for Ad Hoc Network” , Springer-Verlag Berlin [39] Oscar F. Gonzalez, Godwin Ansa, Michael Howarth, and George
Heidelberg, 2007.
Pavlou, “Detection and Accusation of Packet Forwarding Misbehavior
[34] Hesiri Weerasinghe, “Preventing Cooperative Black Hole Attacks in in Mobile Ad-Hoc Networks “, Journal of Internet Engineering, vol. 2,
Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, no. 1, June 2008, pp. 181-192.
International Journal of Software Engineering and Its Applications, Vol. [40] Arshad Jhumka, Nathan Gri_ths, Anthony Dawson and Richard Myers,
2, No. 3, July, 2008, pp: 39-54.
“An Outlook on the Impact of Trust Models on Routing in Mobile Ad
[35] Gao Xiaopeng and Chen Wei,”A Novel Gray Hole Attack Detection Hoc Networks (MANETs)”.
Scheme for Mobile Ad-Hoc Networks”, 2007 IFIP International
[41] Devu Manikantan Shila, Yu Cheng∗ and Tricha Anjali, “Channel-Aware
Conference on Network and Parallel Computing – Workshops, 2007, pp.
Detection of Gray Hole Attacks in Wireless Mesh Networks”, IEEE
209-214.
Global Telecommunications Conference, Dec. 2009, pp. 1-6.
[36] Chen Wei, Long Xiang, Bai Yuebin and Gao Xiaopeng,“A New Solution
[42] Ming-Yang Su, “Prevention of selective black hole attacks on mobile ad
for Resisting Gray Hole Attack in Mobile Ad-Hoc Networks”, Second
hoc networks through intrusion detection systems”, Computer
Communications 2010.

View publication stats

You might also like