ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Honeypot Based Black-Hole Attack Confirmation in a MANET: Black-Hole Attack Confirmation

Tiruvakadu, DSK and Pallapa, V (2018) Honeypot Based Black-Hole Attack Confirmation in a MANET: Black-Hole Attack Confirmation. In: International Journal of Wireless Information Networks, 25 (4). pp. 434-448.

[img] PDF
int_jou_wir_25-4_434-4481_2018.pdf - Published Version
Restricted to Registered users only

Download (2MB) | Request a copy
Official URL: https://doi.org/10.1007/s10776-018-0415-2

Abstract

Many solutions are proposed to identify or prevent the attacks in a Mobile Ad hoc Network. However, sometimes these systems detect false attacks. This could lead to loss of resources in a mobile ad hoc network and cause a downgrade in quality of service. Hence mobile ad hoc networks need a system to confirm the attack before taking further actions. In our work presented in this paper, we propose an attack confirm system for a malicious attacker, called the Black-hole attacker. We present our Black-hole attack Confirmation System, which identifies and confirms the black-hole attack in a mobile ad hoc network using honeypot. The honeypot intelligently identifies all the possible types of black-hole attack using the Black-hole Attack tree, and confirms the attack using the Attack History Database. Together, the Black-hole Attack tree, and Attack History Database aid the honeypot in reducing the false alarms in the mobile ad hoc network. We have simulated the proposed system in several mobile ad hoc network environments of varying sizes of nodes and applications. On several occasions the results have demonstrated that the proposed system is efficient in confirming the black-hole attack and saving the resources and minimizing the path re-establishment.

Item Type: Journal Article
Publication: International Journal of Wireless Information Networks
Publisher: Springer New York LLC
Additional Information: The copyright for this article belongs to Springer New York LLC.
Keywords: Forestry; Gravitation; Network security; Quality of service; Stars; Trees (mathematics), Attack history database; Attack tree; Black hole attack; Black holes; Confirmation systems; False alarms; Honeypots; Path re-establishment, Mobile ad hoc networks
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 04 Aug 2022 05:55
Last Modified: 04 Aug 2022 05:55
URI: https://eprints.iisc.ac.in/id/eprint/75128

Actions (login required)

View Item View Item