An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network ba...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 780 |
---|---|
container_issue | |
container_start_page | 775 |
container_title | |
container_volume | |
creator | Jiwen Cai Ping Yi Jialin Chen Zhiyang Wang Ning Liu |
description | Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate. |
doi_str_mv | 10.1109/AINA.2010.143 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5474791</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5474791</ieee_id><sourcerecordid>5474791</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-8454aa436a84a1339e5a656d7da799bf7236f9a8121220b5ad1feff22e091e283</originalsourceid><addsrcrecordid>eNpVjDtPwzAUhc1LopSOTCz-Ayl-3GvHYyjQVqraBSS26jZxwDQkUWKB-u9JBQvT0fnOg7EbKaZSCneXLdfZVImjBX3CJs6mEhSAMc6oUzZSWqsEDaZn_zLEczaSiCIBwNdLdtX3H0JoAxZHbJPVPCuojeHL86xtu4bydx4b_uCjz2Oo3_h9RfmeU13weUcHvmiqoRnjAHsejusB5Xzt43fT7a_ZRUlV7yd_OmYvT4_Ps0Wy2syXs2yVBGkxJikgEIE2lAJJrZ1HMmgKW5B1bldapU3pKJVKKiV2SIUsfVkq5YWTXqV6zG5_f4P3ftt24ZO6wxbBgnVS_wA1WVCh</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jiwen Cai ; Ping Yi ; Jialin Chen ; Zhiyang Wang ; Ning Liu</creator><creatorcontrib>Jiwen Cai ; Ping Yi ; Jialin Chen ; Zhiyang Wang ; Ning Liu</creatorcontrib><description>Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate.</description><identifier>ISSN: 1550-445X</identifier><identifier>ISBN: 9781424466955</identifier><identifier>ISBN: 1424466954</identifier><identifier>EISSN: 2332-5658</identifier><identifier>EISBN: 9781424466962</identifier><identifier>EISBN: 1424466962</identifier><identifier>EISBN: 076954018X</identifier><identifier>EISBN: 9780769540184</identifier><identifier>DOI: 10.1109/AINA.2010.143</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad Hoc ; Ad hoc networks ; Black Hole ; Computer aided instruction ; Control systems ; Cross layer design ; DSR ; Gray Hole ; Information security ; Intrusion detection ; Mobile ad hoc networks ; Network topology ; Routing protocols ; Testing</subject><ispartof>2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, p.775-780</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5474791$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5474791$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jiwen Cai</creatorcontrib><creatorcontrib>Ping Yi</creatorcontrib><creatorcontrib>Jialin Chen</creatorcontrib><creatorcontrib>Zhiyang Wang</creatorcontrib><creatorcontrib>Ning Liu</creatorcontrib><title>An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network</title><title>2010 24th IEEE International Conference on Advanced Information Networking and Applications</title><addtitle>AINA</addtitle><description>Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate.</description><subject>Ad Hoc</subject><subject>Ad hoc networks</subject><subject>Black Hole</subject><subject>Computer aided instruction</subject><subject>Control systems</subject><subject>Cross layer design</subject><subject>DSR</subject><subject>Gray Hole</subject><subject>Information security</subject><subject>Intrusion detection</subject><subject>Mobile ad hoc networks</subject><subject>Network topology</subject><subject>Routing protocols</subject><subject>Testing</subject><issn>1550-445X</issn><issn>2332-5658</issn><isbn>9781424466955</isbn><isbn>1424466954</isbn><isbn>9781424466962</isbn><isbn>1424466962</isbn><isbn>076954018X</isbn><isbn>9780769540184</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjDtPwzAUhc1LopSOTCz-Ayl-3GvHYyjQVqraBSS26jZxwDQkUWKB-u9JBQvT0fnOg7EbKaZSCneXLdfZVImjBX3CJs6mEhSAMc6oUzZSWqsEDaZn_zLEczaSiCIBwNdLdtX3H0JoAxZHbJPVPCuojeHL86xtu4bydx4b_uCjz2Oo3_h9RfmeU13weUcHvmiqoRnjAHsejusB5Xzt43fT7a_ZRUlV7yd_OmYvT4_Ps0Wy2syXs2yVBGkxJikgEIE2lAJJrZ1HMmgKW5B1bldapU3pKJVKKiV2SIUsfVkq5YWTXqV6zG5_f4P3ftt24ZO6wxbBgnVS_wA1WVCh</recordid><startdate>201004</startdate><enddate>201004</enddate><creator>Jiwen Cai</creator><creator>Ping Yi</creator><creator>Jialin Chen</creator><creator>Zhiyang Wang</creator><creator>Ning Liu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201004</creationdate><title>An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network</title><author>Jiwen Cai ; Ping Yi ; Jialin Chen ; Zhiyang Wang ; Ning Liu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-8454aa436a84a1339e5a656d7da799bf7236f9a8121220b5ad1feff22e091e283</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Ad Hoc</topic><topic>Ad hoc networks</topic><topic>Black Hole</topic><topic>Computer aided instruction</topic><topic>Control systems</topic><topic>Cross layer design</topic><topic>DSR</topic><topic>Gray Hole</topic><topic>Information security</topic><topic>Intrusion detection</topic><topic>Mobile ad hoc networks</topic><topic>Network topology</topic><topic>Routing protocols</topic><topic>Testing</topic><toplevel>online_resources</toplevel><creatorcontrib>Jiwen Cai</creatorcontrib><creatorcontrib>Ping Yi</creatorcontrib><creatorcontrib>Jialin Chen</creatorcontrib><creatorcontrib>Zhiyang Wang</creatorcontrib><creatorcontrib>Ning Liu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jiwen Cai</au><au>Ping Yi</au><au>Jialin Chen</au><au>Zhiyang Wang</au><au>Ning Liu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network</atitle><btitle>2010 24th IEEE International Conference on Advanced Information Networking and Applications</btitle><stitle>AINA</stitle><date>2010-04</date><risdate>2010</risdate><spage>775</spage><epage>780</epage><pages>775-780</pages><issn>1550-445X</issn><eissn>2332-5658</eissn><isbn>9781424466955</isbn><isbn>1424466954</isbn><eisbn>9781424466962</eisbn><eisbn>1424466962</eisbn><eisbn>076954018X</eisbn><eisbn>9780769540184</eisbn><abstract>Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate.</abstract><pub>IEEE</pub><doi>10.1109/AINA.2010.143</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1550-445X |
ispartof | 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, p.775-780 |
issn | 1550-445X 2332-5658 |
language | eng |
recordid | cdi_ieee_primary_5474791 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Ad Hoc Ad hoc networks Black Hole Computer aided instruction Control systems Cross layer design DSR Gray Hole Information security Intrusion detection Mobile ad hoc networks Network topology Routing protocols Testing |
title | An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T14%3A31%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20Adaptive%20Approach%20to%20Detecting%20Black%20and%20Gray%20Hole%20Attacks%20in%20Ad%20Hoc%20Network&rft.btitle=2010%2024th%20IEEE%20International%20Conference%20on%20Advanced%20Information%20Networking%20and%20Applications&rft.au=Jiwen%20Cai&rft.date=2010-04&rft.spage=775&rft.epage=780&rft.pages=775-780&rft.issn=1550-445X&rft.eissn=2332-5658&rft.isbn=9781424466955&rft.isbn_list=1424466954&rft_id=info:doi/10.1109/AINA.2010.143&rft_dat=%3Cieee_6IE%3E5474791%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424466962&rft.eisbn_list=1424466962&rft.eisbn_list=076954018X&rft.eisbn_list=9780769540184&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5474791&rfr_iscdi=true |