[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Black Hole Combat Using Node Stability System in MANET

  • Conference paper
Signal Processing and Information Technology (SPIT 2011)

Abstract

MANET (Mobile Ad hoc Network) is a form of ad hoc network consisting of mobile nodes. The behavior of such network is autonomous and it gets connected to several types of network by using wireless connection. As no nodes in this network infrastructure are stationary, nodes link each other to participate in transmission. However nodes in the family may turn bad (malicious) or external attacking nodes disrupt secured routing bringing instability to network and sometimes increasing threat to applications of importance for e.g. both military and civilian applications. In both the above cases the nodes needs to be punished. In this paper we use a Node Stability System (NSS) to propose methods of identification of singular and co-operative Black hole nodes and provide steps to recover the network from such vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. In: Proceedings of the ICNICONSMCL 2006 (2006)

    Google Scholar 

  2. Mölsä, J.V.E.: Increasing the dos attack resiliency in military ad hoc networks. In: Proc. IEEE MILCOM, Atlantic City, New Jersey, USA (2005)

    Google Scholar 

  3. Tamilselvan, L., Sankaranarayanan, V.: Prevention of Blackhole Attack in MANET. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications. IEEE (2007)

    Google Scholar 

  4. Aad, I., Hubaux, J.-P., Knightly, E.W.: Impact of Denial of Service Attacks on Ad Hoc Networks. IEEE Transactions on Networking, Reference: LCA-ARTICLE-2007-011

    Google Scholar 

  5. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks. In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, MobiCom 2002 (2002)

    Google Scholar 

  6. Choudhury, S., Roy, S.D., Singh, S.A.: Trust Management in Ad Hoc Network for Secure DSR Routing. In: CISSE 2007, December 3-12 (2007)

    Google Scholar 

  7. Johnson, D.B., Maltz, D.A.: The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF (October 1999)

    Google Scholar 

  8. Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing Attacks and defense in Wireless Ad Hoc Network Routing Protocols. In: ACM Workshop on Wireless Security (WiSe 2003), San Diego, CA, pp. 30–40 (September 2003)

    Google Scholar 

  9. Choudhury, S., Roy, S.D., Singh, S.A.: Countering Sinkhole and Black hole attacks on Sensor Networks using Dynamic Trust Management System. In: CISSE 2008 (2008)

    Google Scholar 

  10. Wood, A.D., Stankovic, J.A.: A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks

    Google Scholar 

  11. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks

    Google Scholar 

  12. Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks (July 2003), http://arxiv.org/pdf/cs.NI/0307012

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Chatterjee, R., Routray, M. (2012). Black Hole Combat Using Node Stability System in MANET. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32573-1_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32572-4

  • Online ISBN: 978-3-642-32573-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics