A Review of Black-Hole Attack Mitigation Techniques ...

11 downloads 0 Views 190KB Size Report
which perform black hole attack in which the misbehaving nodes. 8 attract all the .... which the cluster head detect the black hole attack and 118 inform about it in ...... [34] F. Shi, W. Liu, D. Jin and J. Song, “A cluster-based countermeasure. 341.
A Review of Black-Hole Attack Mitigation Techniques and its Drawbacks in Mobile Ad-hoc Network Shashi Gurung1 and Siddhartha Chauhan,2 1

2

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

18

19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Department of Computer JNGEC, Sundernagar Sundernagar, India, Department of Computer Science and Engineering NIT Hamirpur, Hamirpur, India. Email: 1 [email protected], 2 [email protected]

Abstract—Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless networking field in which the movables nodes operates in distributed manner and collaborates with each other in order to provide the multi-hop communication between the source and destination nodes. Generally, the main assumption considered in the MANET is that each node is trusted node. However, in the real scenario, there are some unreliable nodes which perform black hole attack in which the misbehaving nodes attract all the traffic towards itself by giving false information of having the minimum path towards the destination with a very high destination sequence number and drops all the data packets. In the paper, we have presented different categories for black hole attack mitigation techniques and also presented the summary of various techniques along with its drawbacks that need to be considered while designing an efficient protocol. Index Terms—MANET, AODV, overhearing, clustering, IDS, blackhole, cross checking, byzantine attacks, sequence number.

I. I NTRODUCTION The mobile ad-hoc network is a collection of independent movable nodes which operate in distributed manners and coordinates with each other in providing communication between the source node and the destination node. These networks can be easily set up and quickly at a low cost without requiring any type of fixed infrastructure like base station which is required in case of setting up the cellular network. It provides multi-hop communication through the intermediate node which plays an important role providing the communication path between the source and the destination node as well as in forwarding the data packets. It is a selfconfigurable, temporary and infrastructure-less networks [1] of mobile devices that communicate with each other if within the direct radio range of each other or via intermediates. The node in MANET has limited computation power due to its smaller size, small memory, and low processing capabilities. Each node in the network behaves as a host and as a router. In order to communicate with other nodes, the network layer protocol such as AODV [2], DSR [3] etc is generally used which helps in finding the optimal route between the source and the destination node. Conventional MANET routing protocols assume that all nodes are trusted node and cooperates with each other but in a real environment, the behavior of nodes can be different which do not cooperates with others nodes. Due to this assumption, MANET’s routing protocols have

many weaknesses that may be exploited by the attacker for launching the attack in the network and thereby disturbing the communication process. Therefore, MANET’s routing protocols are more vulnerable to a denial of service attack [4]. The main contribution of this paper is that we have presented about different possible nature of the node and analyzed the various mitigation techniques with its limitations. We have further categorized these techniques into various schemes and highlighted the major limitation of various schemes. The remaining sections of the paper are structured as follows. Section II explains about black hole attack. In Section III, we describe various techniques that deal with the black hole attack and its classification. The summary of various techniques and its drawbacks are also presented. In Section IV, we discussed the major drawbacks of various schemes that need to be considered for designing efficient routing protocols. At last, Section V concludes the paper. II. B LACKHOLE ATTACK The blackhole attack is known as a packet dropping attack which seriously degrades the performance of the network. In this type of attack, there can be a single legitimate node or multiple legitimate nodes in the network. When there are two or more than two legitimate nodes which collaborate with each other in order to disrupt the communication, they are called as cooperative black hole attack. The attack launched by this genuine node is known as byzantine attacks [5]. In normal AODV protocol, when the source needs to communicate with destination, it broadcasts request packet if it does not have a path towards the destination. The destination node sends back reply packet on receiving the route request from the intermediate node. But in black hole attack, the black hole node on receiving route request packet sends reply packet with false information of having minimum hop count towards the destination with a very high sequence number. The high sequence number indicates about the freshness of the path. On receiving reply packets from the malicious node, the source node starts transmitting the data packets from the path which contains malicious node and then the malicious node starts dropping the data packet. In a network, the route is established on the basis of two main parameters of reply packets which are

This article is accepted for publication in IEEE WiSPNET 2017

44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60

61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83

TABLE I B EHAVIOR OF A N ODE . Malicious

No Yes Yes Yes Yes

Destination Hop count sequence number

Packet drop

1 0 0 1 1

No Yes Yes Yes Yes

1 0 1 0 1



Attack

No Yes Yes Yes Yes

Type attack

of

No attack Black hole Black hole Black hole Gray hole









Fig. 1. Classification of blackhole attack mitigation techniques.

• 84 85 86

87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112

destination sequence number and hop count. The nodes can behave in different ways which are presented in Table I where 1 means true information and 0 means false information. III. L ITERATURE R EVIEW There are various existing techniques which have been proposed by many researchers for combating with the black hole attack in MANET. These techniques have been classified into ten main categories as shown in Fig. 1. The summary of various techniques according to year wise is presented in Table II. • Cryptography based scheme It includes all those solutions in which cryptography technologies such as symmetric key cryptography, digital signature or hashing are used for encryption, verification and integrity purpose so as to be able to secure the network from the possible attacks. • Overhearing based scheme It consists of all the solutions in which normal mobile nodes can overhear its neighbor’s transmission to check its honesty. If its neighbor node is found to be doing some unexpected event, it will be considered as a malicious node and then the information is propagated in the network. • Sequence number threshold based scheme In this category, the source node calculates a threshold value by using destination sequence number parameter of reply packet and drops the reply packet if it contains the sequence number greater than the threshold. The threshold value can be a static type or dynamic type.



Acknowledgment-based scheme In this category, an acknowledgment packet is sent by the node to confirm about the well reception of the packets. Clustering based scheme In this scheme, the network is divided into the cluster in which the cluster head detect the black hole attack and inform about it in the network. Cross-layer collaboration based scheme In this section, it encompasses all those solutions in which more than two layers cooperate with each other to detect the malicious activity in the network. Cross-Checking based schemes In this scheme, cross checking is done by the source node with the others node so that nature of the intermediate node can be found out. The cross checking has to be used without having DRI (Data routing information) table’s information and with DRI table’s information. Trust-based schemes It includes the solutions that compute the node trust values based on neighbor transmission which helps in identifying the nature of node whether malicious or normal. If the trust value of any node is less than the threshold, it is considered as a malicious otherwise normal node. IDS based schemes This scheme is based on special nodes called as IDS nodes which have the capability to detect the malicious activities by overhearing its near transmission and when any anomaly is detected, it broadcast the message in the network to isolate it. Other schemes In this section, there are many solutions which do not come under the above categories. Under this, some solutions are based on reply caching mechanism, repeated next hop based etc.

IV. D RAWBACKS In this section, we have discussed the major drawbacks of various schemes which are presented in Table III. • In overhearing based schemes, the major drawbacks is that every node is required to be in sniffing mode due to which there will more energy consumptions and also in promiscuous mode, there are high chances of false positive due to the collision of packets. • Acknowledgment based schemes also result in high routing overhead due to extra transmission acknowledgment packet by the node after receiving the data packets. Due to this, routing overhead increases and more energy is also consumed which is not suitable for resource constraint network. • Trust based solutions also have problems as there is a periodic exchange of trust values between the nodes which also results in routing overhead and more energy is also consumed due to monitoring and frequently calculation of threshold values.

This article is accepted for publication in IEEE WiSPNET 2017

113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147

148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166

No No

Yes Yes

Yes Yes Yes Yes

Sequence number thresh- AODV old based Acknowledgement based DSR

AODV

AODV DSR

Others Others

Cryptography based

IDS based

F. Ameza et al. [21] Nital Mistry [22]

P. N. Raj et al. [23]

A.Al-Roubaiey et al. [24] C. Li et al. [25]

M. Yang Su [26]

N. Marchang et al. [27] Trust based T.H. Lacey et al. [28] Trust based

R. H. Jhaveri et al. [29] Sequence number thresh- AODV old based R. H. Jhaveri et al. [30] Sequence number thresh- AODV old based

AODV

AODV AODV

AODV

Others

S. Lu et al. [20]

Yes

Yes

Yes Yes

Yes

Yes No

No

No

Yes

No

Yes No

Yes

Yes

AODV

Yes

Yes

H. Weerasinghe [18]

Yes

No

Cross checking based M. Medadian et al. [19] Overhearing Based

Yes

Yes

Yes

Not Discussed Yes (only Proposed Solution) AODV Yes

T. Fahad et al. [17]

Other (Caching mechanism) Cross-layer

S. Dokurer et al. [16]

AODV

Acknowledgement based DSR

K. liu et al. [15]

Yes

Yes

AODV

Chang Wu Yu et al. [14] Cross Checking based

No No

Yes

Yes

Yes Yes

Yes

Yes

L. Tamilselvan et al. [12] Others AODV Satoshi Kurosawa Sequence number thresh- AODV et al. [13] old based

Yes

Yes

Yes

Yes

Yes

Yes

S. Ramaswamy et al. [9] Cross checking AODV Based K.Balakrishnan Acknowledgement based DSR et al. [10] G. Peng et al. [11] Trust based DSR

AODV

Yes

Not used

Not used

Trust packet Not used

Not used

Not used

Acknowledgement packet

Not used

Alert Not used

Opinion Alarm packet SRREQ SRREP

FREQ and FREP packet

FAP

MR-AODV

R-AODV

LTB-AODV Ripsec

ABM

SEAODV

AACK

DPRAODV

AODVSABH MAODV

SAODV

MAODV

MAODV

SMDP

Memory constraint due to requirement of pre-distribution of key less secure due to single unique shared key Cannot detect gray hole attack. If the IDS nodes do not cover the entire network, detection, as well as isolation of gray hole node, will not be possible Routing overhead Designed for CLOSED MANET Routing overhead due to forwarding of reply packet back to the source node Need to deal with cooperative black hole attack

Routing overhead due to multiple reply packets and additional control packets Routing overhead End-to-end delay increases normalized routing overhead increases End-to-end delay increases normalized routing overhead increases Routing overhead increases

Opinion is not always correct

Has higher end-to-end delay than AODV

Need extension of the solution to support node‘s mobility during the session.

Contribute to the traffic congestion. Detects only misbehaving links Broadcasting malicious ID Common neigh- Fail in highly dynamic network topology End to End Delay bour Increases listening Not used SAODV Average end-to-end delay increases Not used Dynamic learn- False positives ing method Check packet DCM Need improvement in the voting mechanism which can deal with gray hole attack. Acknowledgement packet 2ACK Routing overhead assumed no collusion among malicious nodes Not used IDSAODV Assumption that first reply always comes from black hole

Routing overhead

Fail in cooperative black hole attacks

Fail in cooperative black hole attacks

False positive

Proposed Drawbacks protocol/scheme

Send Route Request Watchdog bath(SRR). water Further Request SAODV and Further Reply CREQ CREP EXACT DIFF_ONE Further Request MAODV and Further Reply Acknowledgement packet Two HOP ACK

Extra con- Control packets name trol packets

Yes

Cross checking Based Other

H. Deng et al. [7]

DSR

Base protocol Protocol modified

AODV

Overhearing based

S. Marti et al. [6]

S. Lee et al. [8]

Schemes category

Author

TABLE II S UMMARY OF VARIOUS T ECHNIQUES .

2012

2012

2011 2012

2011

2010

2010

2010

2010 2010

2009

2009

2008

2007

2007

2007

2007

2007 2007

2006

2005

2003

2002

2002

2000

Year

NS-2

NS-2

NS-2 OPNET

NS-2

Continued...

Not discussed

NS-2

NS-2

NS-2 NS-2

NS-2

Glomosim

Qualnet

Not used (Theoretical analysis was done)

NS-2

NS-2

NS-2

Glomosim NS-2

NS-2

NS-2

Not used

NS-2

Berkeley’s Network Simulator (ns) Not Discussed

Simulator used

Sequence number thresh- AODV old based Clustering based AODV

S.Tan et al. [35]

Clustering

M.Singh [50]

AODV

IDS AODV Sequence number thresh- AODV old based Others AODV

S. Gurung et al. [46] J. Kumar et al. [47]

AODV

Sequence number thresh- AODV old based Sequence number thresh- AODV old based

Cross checking Based

C. Panos et al. [48]

Yes Yes Yes

No

Yes

Yes Yes

Yes

Yes

Yes

Not Discussed Yes

A. Dorri et al. [46]

R.H. Jhaveri et al. [45]

A. Salunke et al. [44]

Trust based

IDS based AODV Acknowledgement based DSR Cryptography based DSR

Yes

AODV

F. Barani et al. [40] D. Dhiman et al. [41] K. S. Dhanalakshmi et al. [42] S. Vadhana Kumari et al. [43]

Yes

DSR

J.M. Chang et al. [38] & Others 2014 S. Gurung et al. [39] Others

Yes

DSR

Yes

Yes

M. Mohanapriya IDS based et al. [37] & 2014

A. Katal et al. [36]

Acknowledgement based AODV, OLSR Yes Clustering based AODV Yes

A.Baadache et al. [33] F. Shi et al. [34]

Yes

AODV

Others

R. Yerneni et al. [32]

Yes

Base protocol Protocol modified DSR

Schemes category

H. Nath Saha et al. [31] Cross-Layer based

Author

No

Yes

Yes No

Yes

Yes

No

Yes

No Yes No

No

Yes

Yes

No

No

Yes Yes

Yes

Yes

GAIIS E2ACK IKGM

ANB-AODV

CBDS

MDSR

CBDCDDPT

SRD-AODV

TA, RA Clustering

SAODV

TSR

Not used

Alarm Packet

Assume that no attack takes place during the training phase. The false Positive ratio of the standard CUSUM increases when speed increases and decreases. Mobile trust Energy consumption due to monitoring of cluster head point activities. with clustering

CUSUM

Data Control Packet Alarm packet (Containing malicious id) Alert Packet MGAM Static Threshold value Not used Modified AODV False Positive

Bait Request (RREQ) Packet

2015

2014 2014 2014

2014

2014

2014

2013

2013

2012 2013

2012

2012

Year

2016

2016

2016 2016

Requires detailed study of message exchange in their specific 2015 network for which fine tuning of λ is done Sequence num- An intelligent attacker can breach the security and may escape 2015 ber from detection if the sequence number is below peak value. based bait detection EDRI Delay rises 2016

Routing overhead due to multiple reply packets and additional control packets Generates an additional overhead Complex due to the computation of various values. Cannot tackle Gray hole attack because the gray hole can become cluster head (CH) of the cluster. Cannot prevent black hole attack if sequence number is less than fixed threshold for different environment Increases delay Malicious node can become CH due to high residual energy Not suitable for highly mobile network High routing overhead due to extra control packets such as QREQ, QREP, MNREQ and ALARM packets. If the IDS nodes do not cover the entire network, detection and isolation of gray hole nodes may not be possible High routing overhead due to bait packets. CBDS is DSR based. Acceptance of the last reply packet. by the source node or intermediate node which can come from malicious node leading to performance degradation False Positive Routing overhead due to E-2ACK1 and E-2ACK2 packets Battery consumption as new keys are to be generated instantly by every node when it takes part in the communication High routing overhead due to additional control packets

Various assumption

Proposed Drawbacks protocol/scheme

S-Ack, F-Ant ADMSFA Challenge & monitoring packets Not used DSNT

Not used Acknowledgement packet Not used

Bait Request (RREQ) packet Not used

QREQ, QREP, MNREQ and ALARM

Not used

MREQ and MREP Acknowledgement packet Routing check request Route Check Affirmation Not used

Alert packet

Extra con- Control packets name trol packets

NS-2

NS-3

NS-2 NS-2

OPNET

NS-2

NS-2

NS-2

NS-2 NS-2 NS-2

NS-2

Qualnet

Glomosim

OPNET

NS-2

OPNET NS-2

The platform to do simulation is designed in Java NS-2

Simulator used

210

Sequence number threshold based schemes do not identify the malicious node completely due to openness nature of MANET because the smart attacker has an idea of ongoing communication between the nodes and based on communication, it will try to send a sequence number that is enough to attract the traffic towards itself and escape from detection. Moreover, false positive problem can also take place if black hole node does not send high destination sequence number. • Cryptography based scheme although provides good protection from the external threats but an internal attacker can create havoc in the network. This scheme requires high computation and communication cost which is not feasible in resource constraint network. • In the clustering based scheme, cluster maintenance is an overhead in case of high mobility scenario due to dynamic network topology. Sometimes cluster head (CH) is selected based on residual energy, if gray hole node has the high energy it will become as a CH. If gray hole node becomes the cluster head of the cluster, it will cause performance degradation of the network. • In cross-layer based scheme, more than two layers communicate with each other in order to detect the malicious nodes. This scheme may fail if there is an attack in other layers due to which intercommunication between layers will not be possible and hence attacker may escape from detection. • Cross checking is another scheme that helps in identifying the nature of node by doing cross-checking with other nodes but by sending extra control packet for cross checking, there is more consumption of energy and increase in routing overhead. • IDS based schemes have a special node called IDS nodes which are always or sometimes in sniffing mode. These nodes are not able to detect the malicious nodes properly if the malicious node is outside the radio range of IDS nodes. These special nodes are fixed in the network. Improper placement of special IDS node will not able to protect the network. These are major limitations of various schemes which need to taken into consideration for designing the effective protocols that can combat with the black hole attack with fewer energy consumptions, minimum routing overhead, minimum delay and with accurate detection of malicious nodes.

211

V. C ONCLUSION

167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209

212 213 214 215 216 217 218 219 220 221



In this paper, we discussed the black hole attack problem in the mobile ad-hoc network. There are various techniques which have been proposed by the researcher for dealing with the black hole attacks and these techniques have been classified into various categories according to their basic operation. In this paper, we have presented a summary of various existing techniques with its drawbacks. Finally, some main drawbacks of each scheme are highlighted that needs to be taken care for designing the efficient protocols. Moreover, the study done in this paper will be helpful for the researchers who are interested

in designing the protocols for combating with packet dropping attack in MANET. As a future work, we will propose a new mechanism to protect the network from black hole attack and will also compare it with the previous approach in NS-2 simulator on the various performance metrics like packet delivery rate, average throughput and routing overhead with respect to varying node mobility and varying percentage of malicious nodes in the network. R EFERENCES [1] C.S.R Murthy and B.S. Manoj, B. S, Ad hoc Wireless Networks: Architectures and Protocols. Prentice Hall PTR, 2004. [2] C.E.Perkins, E.Beliding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing”, IETF Internet Draft, MANET working group, 2004. [3] D.B. Johnson, D.A. Maltz and Y-C. Hu, “The dynamic source routing protocol for mobile ad-hoc network”, IETF Internet Draft, 2004. [4] R.H. Jhaveri, S.J. Patel and D.C. Jinwala, “DoS Attacks in Mobile Adhoc Networks: A Survey”, In IEEE 2nd International Conference on Advanced Computing & Communication Technologies, 2012. [5] A.R. Sangi, J. Liu, and L. Zou, “A Performance Analysis of AODV Routing Protocol under Combined Byzantine Attacks in MANETs”, International Conference on Computational Intelligence and Software Engineering, pp. 1–5, 2009. [6] S. Marti, T. J. Giuli, K. Lai and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks”, In Proceeding of 6th annual international conference on Mobile computing and networking, USA, August 2000. [7] H. Deng, H, W. Li and D.P. Agrawal, “Routing security in wireless ad hoc networks. IEEE Communication Magazine”, vol. 40, issue 10, pp. 70–75, 2012. [8] S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc Networks”, International Conference on Parallel Proceedingessing Wowrkshops, August, 2002. [9] S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon and K. Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”, 2003. [10] K. Balakrishnan, J. Deng and P.K. Varshney, “TWOACK: preventing selfishness in mobile ad hoc network”, IEEE Wireless Communications and Networking Conference, pp. 2137–2142, 2005. [11] G. Peng and Z. Chuanyun, “Routing Attacks and Solutions in Mobile Ad hoc Networks”, International Conference on Communication Technology, November 2006, pp. 1–4. [12] L. Tamilselvan and V. Sankaranarayanan, “Prevention of Blackhole Attack in MANET”, In Proceeding of 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, pp. 21–26, 2007. [13] S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, vol. 5 no. 3, pp. 338–346, 2007. [14] C.W. Yu, T.K. Wu, R.H. Cheng, and S.C. Chang, “A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Network”, Springer-Verlag Berlin Heidelberg, 2007. [15] K. liu, J. Deng, P. K. Varshney and K. Balakrishnan, “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs”, IEEE Transaction of Mobile Computing, vol. 6, issue 5, pp. 536–550, 2007. [16] S. Dokurer, Y.M. Erten and C.E. Acar, “Performance analysis of adhoc networks under black hole attacks”. In Proceeding of the IEEE SoutheastCon, 2007. [17] T. Fahad, D. Djenouri and R. Askwith, “On Detecting Packets Droppers in MANET: A Novel Low Cost Approach”, 3rd International Symposium on Information Assurance and Security, pp. 56–61, 2007. [18] H. Weerasinghe, “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks”, Simulation Implementation and Evaluation”, International Journal of Software Engineering and Its Applications, vol. 2, issue 3, pp. 39–54, 2008. [19] M. Medadian, A. Mebadi and E. Shahri, “Combat with Black Hole attack in AODV routing protocol” IEEE 9th Malaysia International Conference, pp. 530–535, 15–17, 2009.

This article is accepted for publication in IEEE WiSPNET 2017

222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292

TABLE III M ERITS AND D RAWBACKS OF VARIOUS SCHEMES .

293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333

Schemes

Merits

Drawbacks

Overhearing-based schemes

Detects single and multiple black hole nodes.

Acknowledgement-based schemes

Good detection rate at low speed.

Trust-based schemes

Detects single and multiple black hole nodes.

Sequence number threshold-based schemes

Detects single and multiple black hole nodes.

Cryptography-based schemes Clustering-based schemes

Good against external threats. Good against the single black hole, multiple black hole and collusive blackhole attacks.

Cross-Layer-based schemes

Ensure High detection accuracy. Low false alarms

High False positive. Energy consumptions Huge routing overhead due to the extra control acknowledgment packets. False positive increases in case of high mobility Routing Overhead due to the periodic exchange of trust values. Energy consumptions due to monitoring the traffic of neighbor nodes and calculation of threshold values. If within the threshold value, it will not able to detect and prevent the attack. Delays and routing overhead increase in case of waiting for multiple reply packets by the source node Requires high computation and communication cost. Cluster formation and maintenance overhead in high mobility scenario. Possible chances for a malicious node to become CH because grayhole node behaves sometimes as a genuine. Layer dependency.

Cross Checking-based schemes

Good against cooperative blackhole attacks in case of cross checking with DRI table.

IDS-based schemes

Single and multiple black hole attacks can be detected by IDS nodes.

[20] S. Lu, L. Li, K.Y. Lam, and L. Jia, “SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack”, IEEE International Conference on Computational Intelligence and Security, pp. 421–425, 2009. [21] F. Ameza, N. Assam and R. Beghdad, “Defending AODV Routing Protocol Against the Black Hole Attack”, International Journal of Computer Science and Information Security, vol. 8, issue 2, pp. 112–117, 2010. [22] N. Mistry, D. C. Jinwala and M. Zaveri, “Improving AODV Protocol against Blackhole Attacks”, International Multiconference of Engineers and Computer Scientists, 2010. [23] P.N. Raj and P. B. Swadas, “DPRAODV: A dynamic learning system against black hole attack in AODV based MANET”, International Journal of Computer Science Issues, vol. 2, issue 3, pp. 54–59, 2010. [24] A. Al-Roubaiey, T. Sheltami, A. Mahmoud, E. Shakshuki and H. Mouftah, “AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection. Enhancement”, 24th IEEE International Conference on Advanced Information Networking and Applications, 2010. [25] L. Celia, W. Zhuang, and Y. Yang, “SEAODV: A Security Enhanced AODV routing protocol for wireless mesh networks”, IEEE International Workshop on Selected Topics in Mobile and Wireless Computing, pp. 699–706, 2010. [26] M. Y. Su, “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems, Elsevier Computer Communication”, 2011. [27] N. Marchang and R. Datta, “Light-weight trust-based routing protocol for mobile ad hoc networks”, IET Information Security, 2011. [28] T.H. Lacey, R.F. Mills, B.E. Mullins, R.A. Raines, M.E. Oxley and S.K. Rogers, “RIPsec e Using reputation-based multilayer security to protect MANETs”, Elsevier Computer & Security, vol. 31, issue 1, pp. 122–136, 2012 [29] R.H. Jhaveri, S.J. Patel and D.C. Jinwala, “Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs”, INFOCOMP Journal of Computer Science, vol. 11, no. 1, pp. 1–12, 2012. [30] R.H. Jhaveri, S.J. Patel and D.C. Jinwala, “A Novel Solution for Gray hole Attack in AODV Based MANETs”. In Proceeding of Third International Conference on Advances in Communication Network and Computing, Springer, pp. 60–67, 2012. [31] H.N. Saha, D. Bhattacharyya, A.K. Bandhyopadhyay, and P.K. Banerjee, “Two-level Secure Re-routing in Mobile Ad Hoc Networks, International

[32] [33]

[34]

[35] [36]

[37]

[38]

[39]

[40]

[41]

[42]

[43]

Requires changes in multiple layers. Increases routing overhead and delay Energy consumptions. Randomly placement of IDS nodes will lead to less detection of the malicious node. Require full coverage of network area.

Conference on Advances in Mobile Network”, Communication and its Applications, pp. 119–122, 2012. R. Yerneni and A.K. Sarje, “Enhancing performance of AODV against Black holeAttack”, ACM, 2012. A. Baadache and A. Belmehdi, “Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks”, Elsevier Journal of Network and Computer Applications, pp. 1130–1139, 2012. F. Shi, W. Liu, D. Jin and J. Song, “A cluster-based countermeasure against black hole attack in MANETs”, Springer Science Business Media New York, 2013. S. Tan & K. Kim, “Secure Route Discovery for Prventing Black Hole Attacks on AODV-based MANETs”, IEEE pp. 1027–1032, 2013. A. Katal, M. Wazid, R.H. Goudar and D. Singh, “A Cluster Based Detection and Prevention Mechanism against Novel Datagram Chunk Dropping Attack in MANET Multimedia Transmission”, In Proceeding of IEEE Conference on Information and Communication Technologies, pp. 479–484, 2013. M. Mohanapriya and I. Krishnamurthi, “Modified DSR protocol for detection and removal of selective black hole attack in MANET”, Elsevier Computers and Electrical Engineering, vol. 40, issue 2, pp. 530–538, 2014. J.M. Chang, P.C. Tsou, I. Woungang, H.C. Chao and C.F. Lai, “Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach”, IEEE System Journal, 2014. S. Gurung and K.K. Saluja, “Mitigating Impact of Blackhole attack in MANET”, In Proceeding of 5th, ACEEE International Conference on Recent Trends in Information, Telecommunication and Computing, ITC, pp. 229–237, 2014. F. Barani, “A Hybrid Approach for Dynamic Intrusion Detection in Ad Hoc Networks Using Genetic Algorithm and Artificial Immune System”, IEEE Iranian Conferenc, pp. 1–6, 2014. D. Dhiman and N. Sood, “Enhanced 2ACK scheme for Reducing Routing Overhead in MANETs” IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 120–125, 2014. K.S. Dhanalakshmi, B. Kannapiran, and A. Divya, “Enhancing Manet Security Using Hybrid Techniques in Key Generation Mechanism”, In Proceeding. of International Conference on Electronics and Communication System, pp. 1–5, 2014. S. Vadhana Kumari and B. Paramasivan, “Ant based Defense Mechanism for Selective Forwarding Attack in MANET”, IEEE ICDE Workshops, pp. 92–97, 2015.

This article is accepted for publication in IEEE WiSPNET 2017

334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375

376 377 378 379 380 381 382 383 384 385 386 387 388 389

[44] A. Salunke and D. Ambawade, “Dynamic Sequence Number Thresholding Protocol for Detection of Blackhole attack in Wireless Sensor Network”, International Conference on Communication, Information & Computing Technology, 2015. [45] R.H. Jhaveri and N.M. Patel, “A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks”. Springer Wireless Network vol. 21, issue 8, pp. 2781–2798, 2015, doi: 10.1007/s11276-015-0945-9. [46] A. Dorri, “An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET”, In Springer Wireless Network, 2016, doi: 10.1007/s11276-016-1251-x. [47] S. Gurung and S. Chauhan, “A novel approach for mitigating gray hole attack in MANET”, Springer Wireless Network, 2016, doi: 10.1007/s11276-016-1353-5.

[48] J. Kumar, M.Kulkarni, D. Gupta and S. Indu, “Secure route discovery in presence of blackhole attack”, Springer CSIT, 2016, doi: 10.1007/s40012-016-0075-2. [49] C. Panos, C. Ntantogian, S. Malliaros and C. Xenakis, “Analyzing, Quantifying, and Detecting the Blackhole attack in Infrastructureless Networks”, Elsevier Computer Networks, 2016, doi: 10.1016/j.comnet.2016.12.006. [50] M.Singh and P. Singh, “Black Hole Attack Detection in MANET Using Mobile Trust Points with Clustering” Springer Smart Trends in Information Technology and Computer Communication, 2016, doi: 10.1007/978-981-10-3433-6_68.

This article is accepted for publication in IEEE WiSPNET 2017

390 391 392 393 394 395 396 397 398 399 400