Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
Blackhole attack is a common attack in mobile ad hoc network (MANET). Generation of this attack is simple, which does not require special tools or sophisticated attack techniques. Various solutions to prevent this attack have been proposed. However, none of them has measured the severity of this att...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Published: |
Inderscience Enterprises Ltd.
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/56024/ http://dx.doi.org/10.1504/IJES.2015.072370 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.56024 |
---|---|
record_format |
eprints |
spelling |
my.utm.560242017-02-15T00:39:41Z http://eprints.utm.my/id/eprint/56024/ Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks Mandala, Satria Ngadi, Md. Asri Mohamad Sharif, Johan Mohd. Zahid, M. Soperi Mohamed, Farhan M. QA75 Electronic computers. Computer science Blackhole attack is a common attack in mobile ad hoc network (MANET). Generation of this attack is simple, which does not require special tools or sophisticated attack techniques. Various solutions to prevent this attack have been proposed. However, none of them has measured the severity of this attack. In fact, the assessment of severity is essential to develop effective and efficient prevention against the attack. The purpose of this study is to investigate the severity of blackhole attack. In this investigation, new security metrics, namely corruption routing table (CRT), compromising relay node (CRN) and compromising originator node (CON), have been proposed and used for the severity evaluation. In addition, a new blackhole attack, namely hybrid blackhole attack (HBHA) with two variants - independent and cooperative HBHAs are also introduced for the purpose of comparative study. Simulations using Java in time simulator/scalable wireless ad hoc network simulator (JiST/SWANS) show that the proposed metrics are effective in assessing the severity of the blackhole attacks. Among these three blackhole attacks, independent HBHA is the most severe attack. Meanwhile, the cooperative HBHA is the most efficient attack Inderscience Enterprises Ltd. 2015 Article PeerReviewed Mandala, Satria and Ngadi, Md. Asri and Mohamad Sharif, Johan and Mohd. Zahid, M. Soperi and Mohamed, Farhan M. (2015) Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. International Journal of Embedded Systems, 7 (3-4). pp. 296-305. ISSN 1741-1068 http://dx.doi.org/10.1504/IJES.2015.072370 DOI:10.1504/IJES.2015.072370 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Mandala, Satria Ngadi, Md. Asri Mohamad Sharif, Johan Mohd. Zahid, M. Soperi Mohamed, Farhan M. Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks |
description |
Blackhole attack is a common attack in mobile ad hoc network (MANET). Generation of this attack is simple, which does not require special tools or sophisticated attack techniques. Various solutions to prevent this attack have been proposed. However, none of them has measured the severity of this attack. In fact, the assessment of severity is essential to develop effective and efficient prevention against the attack. The purpose of this study is to investigate the severity of blackhole attack. In this investigation, new security metrics, namely corruption routing table (CRT), compromising relay node (CRN) and compromising originator node (CON), have been proposed and used for the severity evaluation. In addition, a new blackhole attack, namely hybrid blackhole attack (HBHA) with two variants - independent and cooperative HBHAs are also introduced for the purpose of comparative study. Simulations using Java in time simulator/scalable wireless ad hoc network simulator (JiST/SWANS) show that the proposed metrics are effective in assessing the severity of the blackhole attacks. Among these three blackhole attacks, independent HBHA is the most severe attack. Meanwhile, the cooperative HBHA is the most efficient attack |
format |
Article |
author |
Mandala, Satria Ngadi, Md. Asri Mohamad Sharif, Johan Mohd. Zahid, M. Soperi Mohamed, Farhan M. |
author_facet |
Mandala, Satria Ngadi, Md. Asri Mohamad Sharif, Johan Mohd. Zahid, M. Soperi Mohamed, Farhan M. |
author_sort |
Mandala, Satria |
title |
Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks |
title_short |
Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks |
title_full |
Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks |
title_fullStr |
Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks |
title_full_unstemmed |
Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks |
title_sort |
investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks |
publisher |
Inderscience Enterprises Ltd. |
publishDate |
2015 |
url |
http://eprints.utm.my/id/eprint/56024/ http://dx.doi.org/10.1504/IJES.2015.072370 |
_version_ |
1643653972050837504 |
score |
13.211869 |