Skip to main content
Log in

A new efficient approach for detecting single and multiple black hole attacks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Mobile Ad hoc NETworks (MANET) are networks without infrastructure. The communication range among nodes is limited, where several hops are needed to transmit a packet from the source to the destination. These networks have a constantly changing topology due to its mobile nodes and their arbitrary connections, which make it vulnerable for different attacks. One of the most important attacks in MANET is the black hole attack which degrades the performance of the network by removing all the packets passing through it. There are several techniques for detecting black hole attacks in the ad hoc on demand vector protocol. In this paper, a new approach based on AACK is proposed. The proposed system is to detect the single and multiple black hole attacks by intrusion detection system with SPlitted AACK technique. The system is robust enough to detect all black hole attacks by using an iterative split of the main path until the detection of the malicious nodes. Network simulator 2 is used for simulation. We tested our system on different networks with different network sizes and different numbers of attacks, and we compared our results with some existing intrusion detection system techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Koujalagi A (2018) Considerable detection of black hole attack and analyzing its performance on AODV routing protocol in MANET (mobile ad hoc network). Am J Comput Sci Inf Technol 06(02):1–6

    Google Scholar 

  2. Kumari A, Singhal M, Yadav N (2020) Black hole attack implementation and its performance evaluation using AODV routing in MANET. Inventive communication and computational technologies, vol 89. Springer, Singapore, pp 431–433

    Google Scholar 

  3. Yasin A, Abu Zant M (2018) Detecting and isolating black hole attacks in MANET using timer based baited technique. Wirel Commun Mob Comput 2018:1–10

    Article  Google Scholar 

  4. Bhattacharyya A, Saha HN, Banerjee A, Bhattacharjee D, Dipayan B (2011) Different types of attacks in mobile ADHOC network: prevention and mitigation techniques. Dep. Comput. Sci. Eng. Inst. Eng. Manag. Saltlake, vol 1, no 1, pp 1–11

  5. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, pp 255–265

  6. Lee J-S (2008) A Petri net design of command filters for semiautonomous mobile sensor networks. IEEE Trans Ind Electron 55(4):1835–1841

    Article  Google Scholar 

  7. Sheltami T, Al-Roubaiey A, Shakshuki E, Mahmoud A (2009) Video transmission enhancement in presence of misbehaving nodes in MANETs. Int J Multimed Syst 15(5):273–282

    Article  Google Scholar 

  8. Shakshuki E, Kang N, Sheltami TR (2013) T EAACK–a secure intrusion detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098

    Article  Google Scholar 

  9. Sheltami T, Basabaa A, Shakshuki E (2014) A3ACKs: adaptive three acknowledgments intrusion detection system for MANET’s. J Ambient Intell Hum Comput 5:611–620

    Article  Google Scholar 

  10. Chavan A, Jadhav D, Marathe N, Dongre N (2020) Survey of different countermeasure on network layer attack in wireless network. Inventive communication and computational technologies, vol 89. Springer, Singapore, pp 62–65

    Google Scholar 

  11. Singh V, Singh D. A, Hassan M. M. (2019) Survey: black hole attack detection in MANET. SSRN Electron. In: Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE2019), pp 522–525

  12. Hamamreh Rushdi A (2018) Protocol for multiple black hole attack avoidance in mobile ad hoc networks. In: Recent advances in cryptography and network security, Chapter 3 Licensee IntechOpen, pp 26–39

  13. Kumar Kollati V (2017) IBFWA: integrated bloom filter in watchdog algorithm for hybrid black hole attack detection in MANET IBFWA. Inf Secur J Glob Perspect 26(1):49–60

    Article  Google Scholar 

  14. Augustine A, James M (2015) Black hole detection using Watchdog. Int J Curr Eng Technol 05(04):1–4

    Google Scholar 

  15. Kumar Saxena A, Shukla P, Kumar Sinha S (2019) Enhanced and secure acknowledgement IDS in mobile ad hoc network by hybrid cryptography technique. In: Data, engineering and applications. Springer, Singapore, pp 217–222

  16. Khamayseh Y, Yassein MB, Abu-Jazoh M (2019) Intelligent black hole detection in mobile AdHoc networks. Int J Electr Comput Eng 9(3):1968–1977. https://doi.org/10.11591/ijece.v9i3.pp1968-1977

    Article  Google Scholar 

  17. Yassein M, Khamayseh Y, Abujazoh M (2016) Feature selection for black hole attacks. J Univ Comput Sci 22(4):521–536

    MathSciNet  Google Scholar 

  18. Khamayseh Y, Bader A, Mardini W, BaniYasein M (2011) A new protocol for detecting black hole nodes in Ad Hoc networks. Int J Commun Netw Inf Secur 3(1):36–47

    Google Scholar 

  19. Albalas F, Yaseen MB, Nassar A (2019) Detecting black hole attacks in MANET using Relieff classification algorithm. ACM Int Conf Proc Ser. https://doi.org/10.1145/3330431.3330454

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported as part of a SyDRef research project under the code COOLO7UN290120180002 and financed by the Ministry of Higher Education and Scientific Research (Algeria).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rachid Khalladi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khalladi, R., Rebbah, M. & Smail, O. A new efficient approach for detecting single and multiple black hole attacks. J Supercomput 77, 7718–7736 (2021). https://doi.org/10.1007/s11227-020-03596-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-020-03596-1

Keywords

Navigation