ReverseRoute: An Application-Layer Scheme for Detecting Blackholes in MANET Using Mobile Agents
Title | ReverseRoute: An Application-Layer Scheme for Detecting Blackholes in MANET Using Mobile Agents |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Taggu, A., Mungoli, A., Taggu, A. |
Conference Name | 2018 3rd Technology Innovation Management and Engineering Science International Conference (TIMES-iCON) |
Keywords | application-layer scheme, Blackhole attack, composability, detection mechanism, effective application layer based intrusion detection scheme, Intrusion detection, lower layers, MANET, MANET Attack Detection, Metrics, mobile ad hoc networks, mobile agents, mobility speeds, multiple blackhole nodes, pubcrawl, Resiliency, Routing, Routing protocols, Scalability, security attacks, simple application layer based intrusion detection scheme, single nodes, telecommunication security, Throughput |
Abstract | Mobile Ad-Hoc Networks (MANETs) are prone to many security attacks. One such attack is the blackhole attack. This work proposes a simple and effective application layer based intrusion detection scheme in a MANET to detect blackholes. The proposed algorithm utilizes mobile agents (MA) and wtracert (modified version of Traceroute for MANET) to detect multiple black holes in a DSR protocol based MANET. Use of MAs ensure that no modifications need to be carried out in the underlying routing algorithms or other lower layers. Simulation results show successful detection of single and multiple blackhole nodes, using the proposed detection mechanism, across varying mobility speeds of the nodes. |
URL | https://ieeexplore.ieee.org/document/8621825 |
DOI | 10.1109/TIMES-iCON.2018.8621825 |
Citation Key | taggu_reverseroute:_2018 |
- mobility speeds
- Throughput
- telecommunication security
- single nodes
- simple application layer based intrusion detection scheme
- security attacks
- Scalability
- Routing protocols
- Routing
- Resiliency
- pubcrawl
- multiple blackhole nodes
- application-layer scheme
- mobile agents
- mobile ad hoc networks
- Metrics
- MANET Attack Detection
- MANET
- lower layers
- Intrusion Detection
- effective application layer based intrusion detection scheme
- detection mechanism
- composability
- Blackhole attack