Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks

Blackhole attack is a common attack in mobile ad hoc network (MANET). Generation of this attack is simple, which does not require special tools or sophisticated attack techniques. Various solutions to prevent this attack have been proposed. However, none of them has measured the severity of this att...

Full description

Saved in:
Bibliographic Details
Main Authors: Mandala, Satria, Ngadi, Md. Asri, Mohamad Sharif, Johan, Mohd. Zahid, M. Soperi, Mohamed, Farhan M.
Format: Article
Published: Inderscience Enterprises Ltd. 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/56024/
http://dx.doi.org/10.1504/IJES.2015.072370
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.56024
record_format eprints
spelling my.utm.560242017-02-15T00:39:41Z http://eprints.utm.my/id/eprint/56024/ Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks Mandala, Satria Ngadi, Md. Asri Mohamad Sharif, Johan Mohd. Zahid, M. Soperi Mohamed, Farhan M. QA75 Electronic computers. Computer science Blackhole attack is a common attack in mobile ad hoc network (MANET). Generation of this attack is simple, which does not require special tools or sophisticated attack techniques. Various solutions to prevent this attack have been proposed. However, none of them has measured the severity of this attack. In fact, the assessment of severity is essential to develop effective and efficient prevention against the attack. The purpose of this study is to investigate the severity of blackhole attack. In this investigation, new security metrics, namely corruption routing table (CRT), compromising relay node (CRN) and compromising originator node (CON), have been proposed and used for the severity evaluation. In addition, a new blackhole attack, namely hybrid blackhole attack (HBHA) with two variants - independent and cooperative HBHAs are also introduced for the purpose of comparative study. Simulations using Java in time simulator/scalable wireless ad hoc network simulator (JiST/SWANS) show that the proposed metrics are effective in assessing the severity of the blackhole attacks. Among these three blackhole attacks, independent HBHA is the most severe attack. Meanwhile, the cooperative HBHA is the most efficient attack Inderscience Enterprises Ltd. 2015 Article PeerReviewed Mandala, Satria and Ngadi, Md. Asri and Mohamad Sharif, Johan and Mohd. Zahid, M. Soperi and Mohamed, Farhan M. (2015) Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. International Journal of Embedded Systems, 7 (3-4). pp. 296-305. ISSN 1741-1068 http://dx.doi.org/10.1504/IJES.2015.072370 DOI:10.1504/IJES.2015.072370
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Mandala, Satria
Ngadi, Md. Asri
Mohamad Sharif, Johan
Mohd. Zahid, M. Soperi
Mohamed, Farhan M.
Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
description Blackhole attack is a common attack in mobile ad hoc network (MANET). Generation of this attack is simple, which does not require special tools or sophisticated attack techniques. Various solutions to prevent this attack have been proposed. However, none of them has measured the severity of this attack. In fact, the assessment of severity is essential to develop effective and efficient prevention against the attack. The purpose of this study is to investigate the severity of blackhole attack. In this investigation, new security metrics, namely corruption routing table (CRT), compromising relay node (CRN) and compromising originator node (CON), have been proposed and used for the severity evaluation. In addition, a new blackhole attack, namely hybrid blackhole attack (HBHA) with two variants - independent and cooperative HBHAs are also introduced for the purpose of comparative study. Simulations using Java in time simulator/scalable wireless ad hoc network simulator (JiST/SWANS) show that the proposed metrics are effective in assessing the severity of the blackhole attacks. Among these three blackhole attacks, independent HBHA is the most severe attack. Meanwhile, the cooperative HBHA is the most efficient attack
format Article
author Mandala, Satria
Ngadi, Md. Asri
Mohamad Sharif, Johan
Mohd. Zahid, M. Soperi
Mohamed, Farhan M.
author_facet Mandala, Satria
Ngadi, Md. Asri
Mohamad Sharif, Johan
Mohd. Zahid, M. Soperi
Mohamed, Farhan M.
author_sort Mandala, Satria
title Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
title_short Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
title_full Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
title_fullStr Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
title_full_unstemmed Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
title_sort investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
publisher Inderscience Enterprises Ltd.
publishDate 2015
url http://eprints.utm.my/id/eprint/56024/
http://dx.doi.org/10.1504/IJES.2015.072370
_version_ 1643653972050837504
score 13.211869