UPM Institutional Repository

Performance evaluation of time-based black hole attack detection in mobile ad hoc networks


Citation

Raja Mahmood, Raja Azlina and Hussin, Masnida and Manshor, Noridayu and Khan, A. I. (2014) Performance evaluation of time-based black hole attack detection in mobile ad hoc networks. In: International Conference on Computational Science and Technology 2014 (ICCST2014), 27-28 Aug. 2014, Kota Kinabalu, Sabah, Malaysia. (pp. 1-6).

Abstract

Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or packet drop attack is one example of a harmful attack in mobile ad hoc networks. In this study, we implement a series of time-based black hole attack detection of different time intervals and compare the results. We study the performances of the networks, the packet delivery ratio percentage, with detection interval time of 900, 450 and 300 seconds with a total of 900 seconds of simulation time. The results suggest that appropriate time interval is critical in providing reliable detection results in timely manner. In general, the 450 seconds detection interval time has provided more reliable results, with lower false positive percentage in comparison to those of the 300 seconds detection interval time. The best explanation to the high false positive rate in the shorter detection interval time is due to the insufficient time given to the packets to arrive to the destinations during the detection process. Meanwhile, implementing the attack detection only after 900 seconds may be considered too late and thus, may have a devastating impact to the networks.


Download File

Full text not available from this repository.

Additional Metadata

Item Type: Conference or Workshop Item (Paper)
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.1109/ICCST.2014.7045187
Publisher: IEEE (IEEE Xplore)
Keywords: Time-based detection; Black hole attack; Mobile ad hoc networks
Depositing User: Nursyafinaz Mohd Noh
Date Deposited: 19 Jun 2015 07:39
Last Modified: 19 Jun 2015 07:39
Altmetrics: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045187
URI: http://psasir.upm.edu.my/id/eprint/38885
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item