UPM Institutional Repository

Effective black hole attacks in MANETs


Citation

Raja Mahmood, Raja Azlina and Mohd Hanapi, Zurina and Hasan, Sazlinah and Khan, AsadIqbal (2013) Effective black hole attacks in MANETs. Journal of Computer Science, 9 (12). pp. 1722-1733. ISSN 1549-3636; ESSN: 1552-6607

Abstract

Black hole or packet drop attack is a denial of service attack on routing protocols in which malicious nodes fabricate routing information, attract packets routed through them and then deliberately drop these packets. Most of the black hole attack simulations are performed by constantly fabricating routing information and thus consistently attracting packets to them, which can be easily detected by the intrusion detection system.In this study, a complicated and difficult to detect black hole attack is proposed. The malicious nodes only perform packet drop when they are in the advantageous positions or locations in the networks. This study investigates the impact of the proposed black hole attack performed by random as well as critical nodes, to the network performance. Critical nodes are nodes that reside along the most active traffic paths and results show that the attacks performed by these nodes cause significant damage to the networks or substantial reduction in packet delivery ratio in comparison to that of random nodes.


Download File

[img]
Preview
PDF (Abstract)
Effective black hole attacks in MANETs.pdf

Download (83kB) | Preview

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.3844/jcssp.2013.1722.1733
Publisher: Science Publications
Keywords: Black hole attacks; Critical nodes; Intrusion detections systems; MANETs
Depositing User: Ms. Nida Hidayati Ghazali
Date Deposited: 09 Feb 2015 07:26
Last Modified: 29 Oct 2015 08:07
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.3844/jcssp.2013.1722.1733
URI: http://psasir.upm.edu.my/id/eprint/30590
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item