Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
by Satria Mandala; Md Asri Ngadi; Johan Mohamad Sharif; M. Soperi Mohd Zahid; Farhan Mohamed
International Journal of Embedded Systems (IJES), Vol. 7, No. 3/4, 2015

Abstract: Blackhole attack is a common attack in mobile ad hoc network (MANET). Generation of this attack is simple, which does not require special tools or sophisticated attack techniques. Various solutions to prevent this attack have been proposed. However, none of them has measured the severity of this attack. In fact, the assessment of severity is essential to develop effective and efficient prevention against the attack. The purpose of this study is to investigate the severity of blackhole attack. In this investigation, new security metrics, namely corruption routing table (CRT), compromising relay node (CRN) and compromising originator node (CON), have been proposed and used for the severity evaluation. In addition, a new blackhole attack, namely hybrid blackhole attack (HBHA) with two variants - independent and cooperative HBHAs are also introduced for the purpose of comparative study. Simulations using Java in time simulator/scalable wireless ad hoc network simulator (JiST/SWANS) show that the proposed metrics are effective in assessing the severity of the blackhole attacks. Among these three blackhole attacks, independent HBHA is the most severe attack. Meanwhile, the cooperative HBHA is the most efficient attack.

Online publication date: Sun, 11-Oct-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Embedded Systems (IJES):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com