Abstract
Mobile Ad hoc NETworks (MANET) are networks without infrastructure. The communication range among nodes is limited, where several hops are needed to transmit a packet from the source to the destination. These networks have a constantly changing topology due to its mobile nodes and their arbitrary connections, which make it vulnerable for different attacks. One of the most important attacks in MANET is the black hole attack which degrades the performance of the network by removing all the packets passing through it. There are several techniques for detecting black hole attacks in the ad hoc on demand vector protocol. In this paper, a new approach based on AACK is proposed. The proposed system is to detect the single and multiple black hole attacks by intrusion detection system with SPlitted AACK technique. The system is robust enough to detect all black hole attacks by using an iterative split of the main path until the detection of the malicious nodes. Network simulator 2 is used for simulation. We tested our system on different networks with different network sizes and different numbers of attacks, and we compared our results with some existing intrusion detection system techniques.
Similar content being viewed by others
References
Koujalagi A (2018) Considerable detection of black hole attack and analyzing its performance on AODV routing protocol in MANET (mobile ad hoc network). Am J Comput Sci Inf Technol 06(02):1–6
Kumari A, Singhal M, Yadav N (2020) Black hole attack implementation and its performance evaluation using AODV routing in MANET. Inventive communication and computational technologies, vol 89. Springer, Singapore, pp 431–433
Yasin A, Abu Zant M (2018) Detecting and isolating black hole attacks in MANET using timer based baited technique. Wirel Commun Mob Comput 2018:1–10
Bhattacharyya A, Saha HN, Banerjee A, Bhattacharjee D, Dipayan B (2011) Different types of attacks in mobile ADHOC network: prevention and mitigation techniques. Dep. Comput. Sci. Eng. Inst. Eng. Manag. Saltlake, vol 1, no 1, pp 1–11
Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, pp 255–265
Lee J-S (2008) A Petri net design of command filters for semiautonomous mobile sensor networks. IEEE Trans Ind Electron 55(4):1835–1841
Sheltami T, Al-Roubaiey A, Shakshuki E, Mahmoud A (2009) Video transmission enhancement in presence of misbehaving nodes in MANETs. Int J Multimed Syst 15(5):273–282
Shakshuki E, Kang N, Sheltami TR (2013) T EAACK–a secure intrusion detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098
Sheltami T, Basabaa A, Shakshuki E (2014) A3ACKs: adaptive three acknowledgments intrusion detection system for MANET’s. J Ambient Intell Hum Comput 5:611–620
Chavan A, Jadhav D, Marathe N, Dongre N (2020) Survey of different countermeasure on network layer attack in wireless network. Inventive communication and computational technologies, vol 89. Springer, Singapore, pp 62–65
Singh V, Singh D. A, Hassan M. M. (2019) Survey: black hole attack detection in MANET. SSRN Electron. In: Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE2019), pp 522–525
Hamamreh Rushdi A (2018) Protocol for multiple black hole attack avoidance in mobile ad hoc networks. In: Recent advances in cryptography and network security, Chapter 3 Licensee IntechOpen, pp 26–39
Kumar Kollati V (2017) IBFWA: integrated bloom filter in watchdog algorithm for hybrid black hole attack detection in MANET IBFWA. Inf Secur J Glob Perspect 26(1):49–60
Augustine A, James M (2015) Black hole detection using Watchdog. Int J Curr Eng Technol 05(04):1–4
Kumar Saxena A, Shukla P, Kumar Sinha S (2019) Enhanced and secure acknowledgement IDS in mobile ad hoc network by hybrid cryptography technique. In: Data, engineering and applications. Springer, Singapore, pp 217–222
Khamayseh Y, Yassein MB, Abu-Jazoh M (2019) Intelligent black hole detection in mobile AdHoc networks. Int J Electr Comput Eng 9(3):1968–1977. https://doi.org/10.11591/ijece.v9i3.pp1968-1977
Yassein M, Khamayseh Y, Abujazoh M (2016) Feature selection for black hole attacks. J Univ Comput Sci 22(4):521–536
Khamayseh Y, Bader A, Mardini W, BaniYasein M (2011) A new protocol for detecting black hole nodes in Ad Hoc networks. Int J Commun Netw Inf Secur 3(1):36–47
Albalas F, Yaseen MB, Nassar A (2019) Detecting black hole attacks in MANET using Relieff classification algorithm. ACM Int Conf Proc Ser. https://doi.org/10.1145/3330431.3330454
Acknowledgements
This research was supported as part of a SyDRef research project under the code COOLO7UN290120180002 and financed by the Ministry of Higher Education and Scientific Research (Algeria).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khalladi, R., Rebbah, M. & Smail, O. A new efficient approach for detecting single and multiple black hole attacks. J Supercomput 77, 7718–7736 (2021). https://doi.org/10.1007/s11227-020-03596-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-020-03596-1