Abstract
MANET (Mobile Ad hoc Network) is a form of ad hoc network consisting of mobile nodes. The behavior of such network is autonomous and it gets connected to several types of network by using wireless connection. As no nodes in this network infrastructure are stationary, nodes link each other to participate in transmission. However nodes in the family may turn bad (malicious) or external attacking nodes disrupt secured routing bringing instability to network and sometimes increasing threat to applications of importance for e.g. both military and civilian applications. In both the above cases the nodes needs to be punished. In this paper we use a Node Stability System (NSS) to propose methods of identification of singular and co-operative Black hole nodes and provide steps to recover the network from such vulnerabilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. In: Proceedings of the ICNICONSMCL 2006 (2006)
Mölsä, J.V.E.: Increasing the dos attack resiliency in military ad hoc networks. In: Proc. IEEE MILCOM, Atlantic City, New Jersey, USA (2005)
Tamilselvan, L., Sankaranarayanan, V.: Prevention of Blackhole Attack in MANET. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications. IEEE (2007)
Aad, I., Hubaux, J.-P., Knightly, E.W.: Impact of Denial of Service Attacks on Ad Hoc Networks. IEEE Transactions on Networking, Reference: LCA-ARTICLE-2007-011
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks. In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, MobiCom 2002 (2002)
Choudhury, S., Roy, S.D., Singh, S.A.: Trust Management in Ad Hoc Network for Secure DSR Routing. In: CISSE 2007, December 3-12 (2007)
Johnson, D.B., Maltz, D.A.: The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF (October 1999)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing Attacks and defense in Wireless Ad Hoc Network Routing Protocols. In: ACM Workshop on Wireless Security (WiSe 2003), San Diego, CA, pp. 30–40 (September 2003)
Choudhury, S., Roy, S.D., Singh, S.A.: Countering Sinkhole and Black hole attacks on Sensor Networks using Dynamic Trust Management System. In: CISSE 2008 (2008)
Wood, A.D., Stankovic, J.A.: A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks
Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks (July 2003), http://arxiv.org/pdf/cs.NI/0307012
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chatterjee, R., Routray, M. (2012). Black Hole Combat Using Node Stability System in MANET. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-32573-1_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32572-4
Online ISBN: 978-3-642-32573-1
eBook Packages: Computer ScienceComputer Science (R0)