Reliable Distance Vector routing protocol to handle Blackhole and Selfish (RDVBS) nodes in Ad hoc Networks

##plugins.themes.academic_pro.article.main##

Sandhya Aneja
Neelima Gupta

Abstract

Properties of Mobile Ad hoc Networks (MANETs) present major vulnerabilities in security. The threats considered in MANETs may be due to maliciousness of a node that intentionally disrupts the network by using variety of attacks and/or due to selfishness of the node which does not perform certain operations due to a wish to save power. None of the existing algorithms to mitigate black hole attacks handles selfish nodes. We present a first such algorithm which handles blacknode attack as well as selfish nodes. A co-operative security scheme called Reliable Ad hoc On-demand Distance Vector routing protocol has been proposed to solve the problem of attack by Blackhole node as well as Selfish behavior (RDVBS) . RDVBS behaves like AODV in the absence of attack with only a slight increase in the routing overhead and, detects and isolates black nodes and selfish nodes in the presence of attack. It also recovers from the attack when a black node leaves the network or a selfish node becomesgood. Our protocol is also superior to the previous known algorithms in terms of routing overhead. The protocol also handles multiple and cooperative black nodes.

##plugins.themes.academic_pro.article.details##

How to Cite
Sandhya Aneja, & Neelima Gupta. (2012). Reliable Distance Vector routing protocol to handle Blackhole and Selfish (RDVBS) nodes in Ad hoc Networks. International Journal of Next-Generation Computing, 3(1), 29–51. https://doi.org/10.47164/ijngc.v3i1.26

References

  1. The network simulator - ns2. http://nsnam.isi.edu/nsnam/index.php/User/_Information.
  2. Agrawal, P., Ghosh, R. K., and Das, S. K. 2008. Cooperative black and gray hole attacks in mobile ad hoc networks. In Proceedings of the 2nd international conference on Ubiquitous information management and communication. Korea, 310–314.
  3. Anderson, R. and Kuhn, M. 1996. Tamper resistance - a cautionary note. In Proceedings of the Second Usenix Workshop on Electronic Commerce. 1–11.
  4. Anderson, R. and Kuhn, M. 1997. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols. Paris, France, 125–136.
  5. Banerjee, S. 2008. Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks. In Proceedings of the World Congress on Engineering and Computer Science (WCECS). San Francisco, USA.
  6. Bansal, S. and Baker, M. 2003. Observation-based cooperation enforcement in ad hoc networks. In Research Report cs.NI/0307012 Stanford University.
  7. Bhargava, B. 2002. Intruder identification in ad hoc networks. In CERIAS Security Center and Department of Computer Sciencies. Purdue University, research proposal.
  8. Bhargava, B., de Oliveira, R., Zhang, Y., and Idika, N. C. 2009. Addressing collaborative attacks and defense in ad hoc wireless networks. In Second Workshop on Specialized Ad Hoc Network Systems (SAHNS), in conjunction with the ICDCS.
  9. Buchegger, S. and Boudec, J.-Y. L. 2002a. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing. Lausanne, Switzerland, 403-410.
  10. Buchegger, S. and Boudec, J.-Y. L. 2002b. Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing. Lausanne, Switzerland, 226–236.
  11. Buttyan, L. and Hubaux, J. P. 2000. Enforcing service availability in mobile ad-hoc wans. In First ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC). Boston, MA.
  12. Buttyan, L. and Hubaux, J. P. 2001. Nuglets: a virtual currency to stimulate cooperation in selforganized ad hoc networks. In Technical Report DSC/2001/001, Swiss Federal Institute of Technology - Lausanne.
  13. Buttyan, L. and Hubaux, J. P. 2003. Stimulating cooperation in self-organizing mobile ad hoc networks. Journal for Mobile Networks (MONET), special issue on Mobile Ad Hoc Networks ACM.
  14. Deng, H., Li, W., and Agrawal, D. P. 2002. Routing security in wireless ad hoc networks. In IEEE Communications Magazine. Vol. 40. 70–75.
  15. Ganeriwal, S. and Srivastava, M. 2004. Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SAN' 04). 66–77.
  16. He, Q., Wu, D., and Khosla, P. 2004. SORI: A secure and objective reputation-based incentive scheme for ad hoc networks. In Proceeding of IEEE Wireless Communications and Networking Conference. Atlanta, GA, USA.
  17. Hollick, M., Schmitt, J., Seipl, C., and Steinmetz, R. 2004. On the effect of node misbehavior in ad hoc networks. In Proceedings of IEEE International Conference on Communications. Vol. 6. Paris, France, 3759– 3763.
  18. Huang, Y. A., Fan, W., Lee, W., and Yu, P. S. 2003. Crossfeature analysis for detecting ad-hoc routing anomalies. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS'03). 478–487.
  19. Huang, Y. A. and Lee, W. 2004. Attack analysis and detection for ad hoc routing protocols. In The 7th International Symposium on Recent Advances in Intrusion Detection (RAID' 04). 125–145.
  20. Jakobsson, M., Hubaux, J., and Buttyan, L. 2003. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of Financial Crypto. Gosier, Guadeloupe.
  21. Kargl, F., Klenk, A., Schlott, S., and Weber, M. 2004. Advanced detection of selfish or malicious nodes in ad hoc networks. In Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks. Germany.
  22. Khurana, S., Gupta, N., and Aneja, N. 2006. Reliable ad-hoc on-demand distance vector routing protocol. In Proceeding of the IEEE International Conference on Networking(ICN). 98–103.
  23. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., and Nemoto, Y. 2007. Crossfeature analysis for detecting ad-hoc routing anomalies. International Journal of Network Security 5, 338–346.
  24. Liu, Y. and Yang, Y. R. 2002. Reputation propagation and agreement in mobile ad-hoc networks. In Proceedings of IEEE Wireless Communications and Networking Conference (WCNC).
  25. Marti, S. and Mishra, A. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In 6th Int'l.Conference Mobile Comp. Network. 255–265.
  26. Michiardi, P. and Molva, R. 2002a. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the Sixth IFIP conference on security communications and multimedia. Portoroz, Slovenia.
  27. Michiardi, P. and Molva, R. 2002b. Simulation-based analysis of security exposures in mobile ad hoc networks. In Proceedings of European Wireless Conference.
  28. Parsons, M. and Ebinger, P. 2009. Performance evaluation of the impact of attacks on mobile ad hoc networks. In Proceedings of Field Failure Data Analysis Workshop. USA.
  29. Patcha, A. and Mishra, A. 2003. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In Proceedings Radio and Wireless Conference RAWCON.
  30. Paul, K. and Westhoff, D. 2002. Context aware inferencing to rate a selfish node in dsr-based ad hoc networks. In Proceedings of the IEEE Globecom Conference. Taipeh,, Taiwan.
  31. Ramanathan, R. and Redi, J. 2002. A brief overview of ad hoc networks: Challenges and directions. In IEEE Communications Magazine. 20–22.
  32. Ramaswamy, S., Fu, H., and Nygard, K. 2005. Effect of cooperative black hole attack on mobile ad hoc networks. In Proceedings of ICWN.
  33. Refaei, M. T., Srivastava, V., DaSilva, L., and Eltoweissy, M. 2005. A reputation-based mechanism for isolating selfish nodes in ad hoc networks. In Proceedings of Second IEEE Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS). San Diego, CA, 3–11.
  34. Ruiz, J. C., Friginal, J., de Andrs, D., and Gil, P. 2008. Black hole attack injection in ad hoc networks. http://www.zdnetasia.com/whitepaper/black-hole-attack-injection-in-ad-hoc-networks_wp-2378353.htm.
  35. Shurman, M. A., Yoo, S. M., , and Park, S. 2004. Black hole attack in wireless ad hoc networks. In Proceedings of 42nd ACM Southeast Conference (ACMSE' 04). 96–97.
  36. Srinivasan, A., Teitelbaum, J., , and Wu, J. 2006. DRBTS: Distributed reputation-based beacon trust system. In Proceedings of the 2nd IEEE International Symposium on Dependable. Indianapolis, USA.
  37. Sun, B., Guan, Y., Chen, J., and W.Pooch, U. 2003. Detecting black-hole attack in mobile ad hoc networks. In Proceedings of the 5th European Personal Mobile Communications Conference. 490–495.
  38. Tamilselvan, L. and Sankaranarayanan, V. 2007. Prevention of blackhole attack in manet. In Proceedings of the 2nd IEEE International Conference on Wireless Broadband and Ultra Wideband Communications.
  39. Wang, B., Soltani, S., Shapiro, J. K., and Tan, P.-N. 2005. Local detection of selfish routing behavior in ad hoc networks. In International Symposium on Parallel Architectures, Algorithms and Networks (I-SPAN). Las Vegas.
  40. Wang, W., Lu, Y., and Bhargava, B. K. 2003. On vulnerability and protection of ad hoc on-demand distance vector protocol. In Proceedings of the 10th International Conference on Telecommunications (ICT' 03). Vol. 1. 375–382.
  41. Yan, Z., Zhang, P., and Virtanen, T. 2003. Trust evaluation based security solution in ad hoc networks. In Technical Report, Nokia Research Center. Helsinki, Finland.
  42. Yin, J. and Madria, S. 2006. A hierarchical secure routing protocol against black hole attacks in sensor networks. In Proceedings of IEEE SUTC.
  43. Zhong, S., Chen, J., and Yang, Y. 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM.