Title: Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks

Authors: Satria Mandala; Md Asri Ngadi; Johan Mohamad Sharif; M. Soperi Mohd Zahid; Farhan Mohamed

Addresses: UTM-IRDA Digital Media Centre, Media and Games Innovation Centre of Excellence, Universiti Teknologi Malaysia, Malaysia; Faculty of Computing, Universiti Teknologi Malaysia, Malaysia ' Faculty of Computing, Universiti Teknologi Malaysia, Malaysia ' Faculty of Computing, Universiti Teknologi Malaysia, Malaysia ' Faculty of Computing, Universiti Teknologi Malaysia, Malaysia ' UTM-IRDA Digital Media Centre, Media and Games Innovation Centre of Excellence, Universiti Teknologi Malaysia, Malaysia

Abstract: Blackhole attack is a common attack in mobile ad hoc network (MANET). Generation of this attack is simple, which does not require special tools or sophisticated attack techniques. Various solutions to prevent this attack have been proposed. However, none of them has measured the severity of this attack. In fact, the assessment of severity is essential to develop effective and efficient prevention against the attack. The purpose of this study is to investigate the severity of blackhole attack. In this investigation, new security metrics, namely corruption routing table (CRT), compromising relay node (CRN) and compromising originator node (CON), have been proposed and used for the severity evaluation. In addition, a new blackhole attack, namely hybrid blackhole attack (HBHA) with two variants - independent and cooperative HBHAs are also introduced for the purpose of comparative study. Simulations using Java in time simulator/scalable wireless ad hoc network simulator (JiST/SWANS) show that the proposed metrics are effective in assessing the severity of the blackhole attacks. Among these three blackhole attacks, independent HBHA is the most severe attack. Meanwhile, the cooperative HBHA is the most efficient attack.

Keywords: MANETs; mobile ad hoc networks; network security; hybrid blackhole attacks; HBHA; attack severity; wireless networks; simulation.

DOI: 10.1504/IJES.2015.072370

International Journal of Embedded Systems, 2015 Vol.7 No.3/4, pp.296 - 305

Received: 23 Jul 2014
Accepted: 16 Oct 2014

Published online: 11 Oct 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article