Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Mitigation of Multiple Blackhole Attack in WMN

Print
PDF
IJCA Proceedings on Computing Communication and Sensor Network 2013
© 2013 by IJCA Journal
CCSN2013 - Number 1
Year of Publication: 2013
Authors:
Arijita Bhowmik
Abhishek Majumder

Arijita Bhowmik and Abhishek Majumder. Article: Mitigation of Multiple Blackhole Attack in WMN. IJCA Proceedings on Computing Communication and Sensor Network 2013 CCSN 2013(1):1-4, December 2013. Full text available. BibTeX

@article{key:article,
	author = {Arijita Bhowmik and Abhishek Majumder},
	title = {Article: Mitigation of Multiple Blackhole Attack in WMN},
	journal = {IJCA Proceedings on Computing Communication and Sensor Network 2013},
	year = {2013},
	volume = {CCSN 2013},
	number = {1},
	pages = {1-4},
	month = {December},
	note = {Full text available}
}

Abstract

Wireless Mesh Networks (WMNs) is an emerging technology. Amongst number of challenging issues, security is a very serious issue in WMNs. If the network is not secured, network will be confined to a limited and controlled environment. In WMNs, the static mesh routers (MRs) cooperate with each other to forward packets. The routing protocols assume that all the routers in the network are reliable. Due to open architecture of the WMNs, it suffers from various types of denial of service attacks like collision attacks, packet dropping and misdirection, blackhole attack and multiple blackhole attack. In black hole attack, the routers advertise itself to have a valid route to a destination router, though the route is unauthentic. Some routers can also co-operate with each other to implement multiple blackhole attacks. Many Intrusion Detection Systems (IDSs) such as use of honeypot and routing protocols like modified Ad hoc On-Demand Distance Vector Routing (AODV) have been introduced. In this paper, an algorithm for intrusion detection against multiple blackhole attacks has been proposed. The proposed scheme uses the Data Routing Information Table (DRI) to accurately diagnose multiple black hole attack.

References

  • A. Prathapani, L. Santhanam, and D. P. Agrawal, "Intelligent honeypot agent for blackhole attack detection in wireless mesh networks", in Proc. of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, pp. 753—758, 2009.
  • N. Patil, "Service Discovery in Wireless Mesh Networks", Department of Information Technology, IIIT Allahabad, Allahabad, 2005. 22
  • J. Wang et al. , "An Intrusion Detection System Approach for Wireless Mesh Networks Based on Finite State Machine". Draft available at: http://www. cs. ucla. edu/~wangzy/inestablishment/resource/IDS_draft. pdf (last accessed March 24, 2012)
  • http://en. wikipedia. org/wiki/Intrusion_detection_system
  • T. M. Chen, G. S. Kuo, Z. P. Li, and G. M. Zhu,"Intrusion detection in wireless mesh networks," Security in wireless mesh networks, Auerbach Publication, pp. 145-167, 2008.
  • S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon and K. Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks" in Proc. of International Conference on Wireless Networks, pp. 1-7, 2003.
  • O. Shree, F. J. Ogwu, "A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks", Wireless Sensor Network, vol. 5, no. 4, pp- 76-83, 2013.
  • R. Suryawanshi, S. Tamhankar, "Performance Analysis And Minimization Of Black Hole Attack In MANET", IJERA, vol. 2, no. 4, pp. 1430-1437, 2012.
  • P. Rawat1, S. Goel, M. Agarwal3 and R. Singh, "Securing WMN Using Hybrid Honeypot System," IJDPS, vol. 3, no. 3, pp. 29-34, 2012.
  • L. Santhanam, A. Mukherjee, R. Bhatnagar, and D. P. Agrawal, "A Perception based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks", in Proc. of the International Multi-Conference on Computing in the Global Information Technology, pp. 35, 2007