Skip to main content

A Novel Collaborative Approach for Sinkhole Detection in MANETs

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8629))

Abstract

This paper presents a novel approach intended to detect sinkholes in MANETs running AODV. The study focuses on the detection of the well-known sinkhole attack, devoted to attract most of the surrounding network traffic by providing fake routes, and thus, invalidating alternative legitimate routes and disrupting the normal network operation. Our detection approach relies on the existence of “contamination borders”, formed by legitimate nodes under the influence of the sinkhole attack and, at the same time, neighbors of non-contaminated legitimate nodes. Thus, by collecting the routing information of the neighbors, these nodes are likely to be able to properly detect sinkholes. We evaluate our approach in a simulation framework and the experimental results show the promising nature of this approach in terms of detection capabilities.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lakhtaria, K.I. (ed.): Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends. IGI Global, Hershey (2012)

    Google Scholar 

  2. García-Teodoro, P., Sánchez-Casado, L., Maciá-Fernández, G.: Taxonomy and Holistic Detection of Security Attacks in MANETs, pp. 1–12. CRC Press, April 2014. http://www.crcpress.com/product/isbn/9781466578036

  3. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. IETF, RFC 3561, July 2003

    Google Scholar 

  4. García-Teodoro, P., Díaz-Verdejo, J.E., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)

    Article  Google Scholar 

  5. Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. 9(5), 545–556 (2003)

    Article  Google Scholar 

  6. Huang, Y., Fan, W., Lee, W., Yu, P.S.: Cross-feature analysis for detecting Ad-Hoc routing anomalies. In: Proceedings of 23rd IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 478–487, May 2003

    Google Scholar 

  7. Alem, Y.F., Xuan, Z.C.: Preventing black hole attack in mobile Ad-Hoc networks using anomaly detection. In: Proceedings of 2nd International Conference on Future Computer and Communication (ICFCC), vol. 3, pp. 672–676, May 2010

    Google Scholar 

  8. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting blackhole attack on AODV-based mobile Ad Hoc networks by dynamic learning method. Int. J. Netw. Secur. 5(3), 338–346 (2007)

    Google Scholar 

  9. Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. Int. J. Comput. Sci. Issues 2, 54–59 (2009)

    Google Scholar 

  10. Al-Shurman, M., Yoo, S.M., Park, S.: Black hole attack in mobile Ad Hoc networks. In: Proceedings of 42nd Annual Southeast Regional Conference (ACM-SE), pp. 96–97, April 2004

    Google Scholar 

  11. Mistry, N., Jinwala, D.C., Zaveri, M.: Improving AODV protocol against blackhole attacks. In: Proceedings of International MultiConference of Engineers and Computer Scientists (IMECS), pp. 96–97, March 2010

    Google Scholar 

  12. Mandhata, S.C., Patro, S.N.: A counter measure to black hole attack on AODV-based mobile Ad-Hoc networks. Int. J. Comput. Commun. Technol. (IJCCT) 2(VI), 37–42 (2011)

    Google Scholar 

  13. Himral, L., Vig, V., Chand, N.: Preventing AODV routing protocol from black hole attack. Int. J. Eng. Sci. Technol. (IJEST) 3(5), 3927–3932 (2011)

    Google Scholar 

  14. Varga, A.: OMNeT++ Discrete Event Simulation System. http://www.omnetpp.org/doc/omnetpp/manual/usman.html. Accessed 14 March 2014

  15. Sánchez-Casado, L., Rodríguez-Gómez, R.A., Magán-Carrión, R., Maciá-Fernández, G.: NETA: evaluating the effects of NETwork attacks. MANETs as a case study. In: Awad, A.I., Hassanien, A.E., Baba, K. (eds.) SecNet 2013. CCIS, vol. 381, pp. 1–10. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  16. Johnson, D., Maltz, D.: Dynamic source routing in Ad Hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing. The Kluwer International Series in Engineering and Computer Science, vol. 353, pp. 153–181. Springer US, New York (1996)

    Chapter  Google Scholar 

  17. Barceló, F., Jordán, J.: Channel holding time distribution in cellular telephony. Electron. Lett. 34, 146–147 (1998)

    Article  Google Scholar 

Download references

Acknowledgment

This work has been partially supported by Spanish MICINN through project TEC2011-22579 and by Spanish MECD through the grant “University Professor Training Program” (FPU, Ref.: AP2009-2926).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leovigildo Sánchez-Casado .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sánchez-Casado, L., Maciá-Fernández, G., García-Teodoro, P., Aschenbruck, N. (2015). A Novel Collaborative Approach for Sinkhole Detection in MANETs. In: Garcia Pineda, M., Lloret, J., Papavassiliou, S., Ruehrup, S., Westphall, C. (eds) Ad-hoc Networks and Wireless. ADHOC-NOW 2014. Lecture Notes in Computer Science(), vol 8629. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46338-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46338-3_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46337-6

  • Online ISBN: 978-3-662-46338-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics