An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network

Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network ba...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Jiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 780
container_issue
container_start_page 775
container_title
container_volume
creator Jiwen Cai
Ping Yi
Jialin Chen
Zhiyang Wang
Ning Liu
description Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate.
doi_str_mv 10.1109/AINA.2010.143
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5474791</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5474791</ieee_id><sourcerecordid>5474791</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-8454aa436a84a1339e5a656d7da799bf7236f9a8121220b5ad1feff22e091e283</originalsourceid><addsrcrecordid>eNpVjDtPwzAUhc1LopSOTCz-Ayl-3GvHYyjQVqraBSS26jZxwDQkUWKB-u9JBQvT0fnOg7EbKaZSCneXLdfZVImjBX3CJs6mEhSAMc6oUzZSWqsEDaZn_zLEczaSiCIBwNdLdtX3H0JoAxZHbJPVPCuojeHL86xtu4bydx4b_uCjz2Oo3_h9RfmeU13weUcHvmiqoRnjAHsejusB5Xzt43fT7a_ZRUlV7yd_OmYvT4_Ps0Wy2syXs2yVBGkxJikgEIE2lAJJrZ1HMmgKW5B1bldapU3pKJVKKiV2SIUsfVkq5YWTXqV6zG5_f4P3ftt24ZO6wxbBgnVS_wA1WVCh</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jiwen Cai ; Ping Yi ; Jialin Chen ; Zhiyang Wang ; Ning Liu</creator><creatorcontrib>Jiwen Cai ; Ping Yi ; Jialin Chen ; Zhiyang Wang ; Ning Liu</creatorcontrib><description>Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate.</description><identifier>ISSN: 1550-445X</identifier><identifier>ISBN: 9781424466955</identifier><identifier>ISBN: 1424466954</identifier><identifier>EISSN: 2332-5658</identifier><identifier>EISBN: 9781424466962</identifier><identifier>EISBN: 1424466962</identifier><identifier>EISBN: 076954018X</identifier><identifier>EISBN: 9780769540184</identifier><identifier>DOI: 10.1109/AINA.2010.143</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad Hoc ; Ad hoc networks ; Black Hole ; Computer aided instruction ; Control systems ; Cross layer design ; DSR ; Gray Hole ; Information security ; Intrusion detection ; Mobile ad hoc networks ; Network topology ; Routing protocols ; Testing</subject><ispartof>2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, p.775-780</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5474791$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5474791$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jiwen Cai</creatorcontrib><creatorcontrib>Ping Yi</creatorcontrib><creatorcontrib>Jialin Chen</creatorcontrib><creatorcontrib>Zhiyang Wang</creatorcontrib><creatorcontrib>Ning Liu</creatorcontrib><title>An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network</title><title>2010 24th IEEE International Conference on Advanced Information Networking and Applications</title><addtitle>AINA</addtitle><description>Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate.</description><subject>Ad Hoc</subject><subject>Ad hoc networks</subject><subject>Black Hole</subject><subject>Computer aided instruction</subject><subject>Control systems</subject><subject>Cross layer design</subject><subject>DSR</subject><subject>Gray Hole</subject><subject>Information security</subject><subject>Intrusion detection</subject><subject>Mobile ad hoc networks</subject><subject>Network topology</subject><subject>Routing protocols</subject><subject>Testing</subject><issn>1550-445X</issn><issn>2332-5658</issn><isbn>9781424466955</isbn><isbn>1424466954</isbn><isbn>9781424466962</isbn><isbn>1424466962</isbn><isbn>076954018X</isbn><isbn>9780769540184</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjDtPwzAUhc1LopSOTCz-Ayl-3GvHYyjQVqraBSS26jZxwDQkUWKB-u9JBQvT0fnOg7EbKaZSCneXLdfZVImjBX3CJs6mEhSAMc6oUzZSWqsEDaZn_zLEczaSiCIBwNdLdtX3H0JoAxZHbJPVPCuojeHL86xtu4bydx4b_uCjz2Oo3_h9RfmeU13weUcHvmiqoRnjAHsejusB5Xzt43fT7a_ZRUlV7yd_OmYvT4_Ps0Wy2syXs2yVBGkxJikgEIE2lAJJrZ1HMmgKW5B1bldapU3pKJVKKiV2SIUsfVkq5YWTXqV6zG5_f4P3ftt24ZO6wxbBgnVS_wA1WVCh</recordid><startdate>201004</startdate><enddate>201004</enddate><creator>Jiwen Cai</creator><creator>Ping Yi</creator><creator>Jialin Chen</creator><creator>Zhiyang Wang</creator><creator>Ning Liu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201004</creationdate><title>An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network</title><author>Jiwen Cai ; Ping Yi ; Jialin Chen ; Zhiyang Wang ; Ning Liu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-8454aa436a84a1339e5a656d7da799bf7236f9a8121220b5ad1feff22e091e283</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Ad Hoc</topic><topic>Ad hoc networks</topic><topic>Black Hole</topic><topic>Computer aided instruction</topic><topic>Control systems</topic><topic>Cross layer design</topic><topic>DSR</topic><topic>Gray Hole</topic><topic>Information security</topic><topic>Intrusion detection</topic><topic>Mobile ad hoc networks</topic><topic>Network topology</topic><topic>Routing protocols</topic><topic>Testing</topic><toplevel>online_resources</toplevel><creatorcontrib>Jiwen Cai</creatorcontrib><creatorcontrib>Ping Yi</creatorcontrib><creatorcontrib>Jialin Chen</creatorcontrib><creatorcontrib>Zhiyang Wang</creatorcontrib><creatorcontrib>Ning Liu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jiwen Cai</au><au>Ping Yi</au><au>Jialin Chen</au><au>Zhiyang Wang</au><au>Ning Liu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network</atitle><btitle>2010 24th IEEE International Conference on Advanced Information Networking and Applications</btitle><stitle>AINA</stitle><date>2010-04</date><risdate>2010</risdate><spage>775</spage><epage>780</epage><pages>775-780</pages><issn>1550-445X</issn><eissn>2332-5658</eissn><isbn>9781424466955</isbn><isbn>1424466954</isbn><eisbn>9781424466962</eisbn><eisbn>1424466962</eisbn><eisbn>076954018X</eisbn><eisbn>9780769540184</eisbn><abstract>Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate.</abstract><pub>IEEE</pub><doi>10.1109/AINA.2010.143</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1550-445X
ispartof 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, p.775-780
issn 1550-445X
2332-5658
language eng
recordid cdi_ieee_primary_5474791
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Ad Hoc
Ad hoc networks
Black Hole
Computer aided instruction
Control systems
Cross layer design
DSR
Gray Hole
Information security
Intrusion detection
Mobile ad hoc networks
Network topology
Routing protocols
Testing
title An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T14%3A31%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20Adaptive%20Approach%20to%20Detecting%20Black%20and%20Gray%20Hole%20Attacks%20in%20Ad%20Hoc%20Network&rft.btitle=2010%2024th%20IEEE%20International%20Conference%20on%20Advanced%20Information%20Networking%20and%20Applications&rft.au=Jiwen%20Cai&rft.date=2010-04&rft.spage=775&rft.epage=780&rft.pages=775-780&rft.issn=1550-445X&rft.eissn=2332-5658&rft.isbn=9781424466955&rft.isbn_list=1424466954&rft_id=info:doi/10.1109/AINA.2010.143&rft_dat=%3Cieee_6IE%3E5474791%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424466962&rft.eisbn_list=1424466962&rft.eisbn_list=076954018X&rft.eisbn_list=9780769540184&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5474791&rfr_iscdi=true