32nd IEEE Conference on Local Computer Networks (LCN 2007) 2007
DOI: 10.1109/lcn.2007.72
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs

Abstract: Black Hole Attacks are a serious threat to communication in tactical MANETs. In this work we present TOGBAD a new centralised approach, using topology graphs to identify nodes attempting to create a black hole. We use well-established techniques to gain knowledge about the network topology and use this knowledge to perform plausibility checks of the routing information propagated by the nodes in the network. We consider a node generating fake routing information as malicious. Therefore, we trigger an alarm if … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(32 citation statements)
references
References 17 publications
0
32
0
Order By: Relevance
“…Black holes in the network refer to locations where malicious nodes discard network traffic without the source being told that the parcel did not achieve the asked goal [7]. Notwithstanding of the mobile routing protocol, every node on the path between the source and goal is a potential black-hole attacker.…”
Section: Black-and Gray-hole Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Black holes in the network refer to locations where malicious nodes discard network traffic without the source being told that the parcel did not achieve the asked goal [7]. Notwithstanding of the mobile routing protocol, every node on the path between the source and goal is a potential black-hole attacker.…”
Section: Black-and Gray-hole Attackmentioning
confidence: 99%
“…Among the distinctive different sorts of assaults including wormhole attack [3], ridiculing attack [2], replay attack [4], Black-hole attack [7], flooding attack [7], collouding mis-replay attacks [6],and numerous different attacks gray hole attack is more default and dangerous to dissect. On MANETs it showed when a malevolent node can noiselessly dispose of a few messages known as dark opening assault and if there should be an occurrence of all messages it is known as black hole attack.…”
Section: Introductionmentioning
confidence: 99%
“…Gerhards et al [14] proposed a mobile ad hoc network (MANET) which has no centralized administration. In MANET, the collection of mobile ad hoc node acts as selforganized nodes with dynamic topology.…”
Section: Research Articlementioning
confidence: 99%
“…Many other secure and robust routing protocols have been designed and many security schemes have been recommended to tackle these issues in the security. In MANET, routing attacks are particularly severe due to presence of malicious nodes [14].…”
Section: Research Articlementioning
confidence: 99%
“…Their method has claimed to eliminate black hole attack in Ad hoc on Demand distance Vector (AODV) protocol. -Padilla et al (2007) introduced the network with black hole. They devised TOGBAD, a new centralized approach, using topology graphs to identify nodes attempting to create a black hole.…”
Section: Related Workmentioning
confidence: 99%