Quantifying the severity of blackhole attack in wireless mobile adhoc networks

Blackhole attack is one of the severe attacks inMANET routing protocols. Generation of this attack is simple, which does not require specific tools or sophisticated attack techniques. However, this attack seriously corrupts the routing tables of nodes in the network. Even worse, the attack could inc...

Full description

Saved in:
Bibliographic Details
Main Authors: Ngadi, Md. Asri, Kamat, Maznah, Coulibaly, Yahaya, Mandala, Satria, Kommineni, Jenni
Format: Article
Published: Springer Verlag 2014
Subjects:
Online Access:http://eprints.utm.my/id/eprint/62376/
http://dx.doi.org/10.1007/978-3-662-44966-0_6
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.62376
record_format eprints
spelling my.utm.623762017-06-14T00:41:06Z http://eprints.utm.my/id/eprint/62376/ Quantifying the severity of blackhole attack in wireless mobile adhoc networks Ngadi, Md. Asri Kamat, Maznah Coulibaly, Yahaya Mandala, Satria Kommineni, Jenni QA75 Electronic computers. Computer science Blackhole attack is one of the severe attacks inMANET routing protocols. Generation of this attack is simple, which does not require specific tools or sophisticated attack techniques. However, this attack seriously corrupts the routing tables of nodes in the network. Even worse, the attack could increase the chances of losing confidential data and deny network services. Many researchers have proposed a variety of solutions to prevent this Conventional Blackhole Attack (CBA). Unfortunately, none of them has measured the severity of this attack. Filling gaps in measuring the severity of this attack, this research proposes a new security metrics, namely Corruption Routing Table (CRT), Compromising Relay Node (CRN) and Compromising Originator Node (CON). In addition, this research also introduces a new blackhole attack, namely Hybrid Black Hole Attack (HBHA) with two variants - Independent and Cooperative HBHAs. The proposed metrics proved effective in measuring the severity of both CBA and HBHAs. Simulation using Java in Time Simulator/Scalable Wireless Adhoc Network Simulator (JiST/SWANS) showed that Independent HBHA is the most severe attack compared to Cooperative HBHA and CBA. In addition, Cooperative HBHA is the most efficient attack than Independent HBHA and CBA. Springer Verlag 2014 Article PeerReviewed Ngadi, Md. Asri and Kamat, Maznah and Coulibaly, Yahaya and Mandala, Satria and Kommineni, Jenni (2014) Quantifying the severity of blackhole attack in wireless mobile adhoc networks. Security in Computing and Communications, 467 . pp. 57-67. ISSN 1865-0929 http://dx.doi.org/10.1007/978-3-662-44966-0_6 DOI:10.1007/978-3-662-44966-0_6
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ngadi, Md. Asri
Kamat, Maznah
Coulibaly, Yahaya
Mandala, Satria
Kommineni, Jenni
Quantifying the severity of blackhole attack in wireless mobile adhoc networks
description Blackhole attack is one of the severe attacks inMANET routing protocols. Generation of this attack is simple, which does not require specific tools or sophisticated attack techniques. However, this attack seriously corrupts the routing tables of nodes in the network. Even worse, the attack could increase the chances of losing confidential data and deny network services. Many researchers have proposed a variety of solutions to prevent this Conventional Blackhole Attack (CBA). Unfortunately, none of them has measured the severity of this attack. Filling gaps in measuring the severity of this attack, this research proposes a new security metrics, namely Corruption Routing Table (CRT), Compromising Relay Node (CRN) and Compromising Originator Node (CON). In addition, this research also introduces a new blackhole attack, namely Hybrid Black Hole Attack (HBHA) with two variants - Independent and Cooperative HBHAs. The proposed metrics proved effective in measuring the severity of both CBA and HBHAs. Simulation using Java in Time Simulator/Scalable Wireless Adhoc Network Simulator (JiST/SWANS) showed that Independent HBHA is the most severe attack compared to Cooperative HBHA and CBA. In addition, Cooperative HBHA is the most efficient attack than Independent HBHA and CBA.
format Article
author Ngadi, Md. Asri
Kamat, Maznah
Coulibaly, Yahaya
Mandala, Satria
Kommineni, Jenni
author_facet Ngadi, Md. Asri
Kamat, Maznah
Coulibaly, Yahaya
Mandala, Satria
Kommineni, Jenni
author_sort Ngadi, Md. Asri
title Quantifying the severity of blackhole attack in wireless mobile adhoc networks
title_short Quantifying the severity of blackhole attack in wireless mobile adhoc networks
title_full Quantifying the severity of blackhole attack in wireless mobile adhoc networks
title_fullStr Quantifying the severity of blackhole attack in wireless mobile adhoc networks
title_full_unstemmed Quantifying the severity of blackhole attack in wireless mobile adhoc networks
title_sort quantifying the severity of blackhole attack in wireless mobile adhoc networks
publisher Springer Verlag
publishDate 2014
url http://eprints.utm.my/id/eprint/62376/
http://dx.doi.org/10.1007/978-3-662-44966-0_6
_version_ 1643655399994294272
score 13.18916