A Study of Blackhole and Wormhole Attacks in Mobile Adhoc Networks

Hoang Hai Tran1, , Dang Toi Nguyen1
1 Hanoi University of Science and Technology, No. 1, Dai Co Viet, Hai Ba Trung, Ha Noi, Viet Nam

Main Article Content

Abstract

In the Mobile Ad-hoc Network (MANET), there are several ways of attacking network operation bypassing fault routing information between malicious and normal nodes. It will degrade efficiency of the network so we cannot archive the purposes of the designed MANET. Since it is deployed in an open network environment with characteristics of high mobility, lack of physical security and independent management, the network is vulnerable to attacks. In related works, we have seen a lot of works focusing on single type of attacks but in our paper, we study how routing attacks work and study how we can simulate combination of blackhole and wormhole attacks. Our code will be open to community so others can use to test with its security mechanism or secure routing protocols.

Article Details

References

[1] Raja, M.L. and Baboo, C.D.S.S. (2014) An Overview of MANET: Applications, Attacks and Challenge.
[2] Jhaveri, R.H.; Patel, N.M. (2015). Mobile Ad-hoc Networking with AODV: A Review. International Journal of Next-Generation Computing. 6 (3): 165–191.
[3] Johnson, David B.; Maltz, David A. (1996). Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing. The Kluwer International Series in Engineering and Computer Science. 353. pp. 153–181.
[4] Extensions to OSPF to Support Mobile Ad Hoc Networking, Madhavi Chandra, Abhay Roy, Mar-10. Computer Science, Volume 3, 2011.
[5] Gurung, S. & Chauhan, A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability, S. Wireless Netw (2019).
[6] Elahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi, Chapter 2 - Literature Review, Editor(s): Elahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi, A Study of Blackhole Attack Solutions, Syngress, 2016, Pages 7-57, ISBN 9780128053676.
[7] K.S. Praveen, H.L. Gururaj, B. Ramesh, Comparative Analysis of Blackhole Attack in Ad Hoc Network Using AODV and OLSR Protocols, Procedia Computer Science, Volume 85, 2016.
[8] Qussai M. Yaseen, Monther Aldwari, An Enhanced AODV Protocol for Avoiding Blackholes in MANET, Procedia Computer Science, Volume 134, 2018, Pages 371-376.
[9] P. Nagrath and B. Gupta, Wormhole attacks in wireless adhoc networks and their counter measurements: A survey, 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, 2011, pp. 245–250.
[10] Farjamia, G., Gasimov, Y. & Kazimov, Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks, C. Wireless Pers Commun (2019) 105: 1561.
[11] Dutta N., Singh M.M. (2019) Wormhole Attack in Wireless Sensor Networks: A Critical Review. In: Mandal J., Bhattacharyya D., Auluck N. (eds) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol 702. Springer, Singapore.
[12] Raja Datta, Ningrinla Marchang, Chapter 7 - Security for Mobile Ad Hoc Networks, Editor(s): Sajal K. Das, Krishna Kant, Nan Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure, Morgan Kaufmann, 2012.
[13] Kumar, Dr Mukesh. (2013). Analysis of Blackhole and Wormhole Attack using AODV Protocol. International Journal of Research in Management, Science & Technology (E-ISSN: 2321-3264) Vol.1; No. 1, June 2013 pp. 44-28.
[14] A.A. Chavan, D.S. Kurule, P.U. Dere, Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Blackhole Attack, Procedia Computer Science, Volume 79, 2016.
[15] Henderson, Tom (2012-06-09), Upcoming ns-2.35 release (Mailing list), ns-235 GSoC 2015 students. Archived from the original on 2012-03-27. Retrieved 2013-05-31.
[16] Tran Hoang Hai, Nguyen Dang Toi, Eui-nam Huh (2019) Performance Evaluation of AODV and AOMDV Routing Protocols Under Collaborative Blackhole and Wormhole Attacks, Advances in Computer Science and Ubiquitous Computing. CUTE 2019, CSA 2019.