A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks


The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can disrupt the services of this layer. This paper takes a look at some important detection and mitigation techniques and presents the drawbacks. After analysis of current mechanisms, the paper proposes RID-AODV, a security solution for multiple black-hole attack in wireless mesh networks. Based on the backbone of AODV, RID-AODV combines the ability of route skipping of IDSAODV and route failure correction using reverse route establishment of RAODV. The enhanced protocol RID-AODV, AODV, IDSAODV, and RAODV are implemented in a simulated environment using ns-2.35 simulator. The networks for each protocol are bombarded with up to ten black-hole nodes starting from zero. The results obtained are then analyzed and compared and a discussion is presented.

Share and Cite:

O. Shree and F. Ogwu, "A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks," Wireless Sensor Network, Vol. 5 No. 4, 2013, pp. 76-83. doi: 10.4236/wsn.2013.54010.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] W. Stallings, “Network Security Essentials: Applications and Standards,” 2nd Edition, Prentice Hall, Upper Saddle River, 2003.
[2] CERT Statistics (Historical). http://www.cert.org/historical/
[3] C. Kim, E. Talipov and B. Ahn, “A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks,” Proceeding from EUC’06: The 2006 International Conference on Emerging Directions in Embedded and Ubiquitous Computing, Seoul, 1-4 August 2006, pp. 522-531.
[4] S. Dokurer, Y. M. Erten and E. A. Can, “Performance Analysis of Ad-Hoc Networks under Black Hole Attacks,” Proceeding from SE-CON’07: IEEE Southeast Conference, Richmond, 22-25 March 2007, pp. 148-153.
[5] M. Imani, M. E. Rajabi, M. Taheri and M. Naderi, “Vulnerabilities in Network Layer at Wireless Mesh Network (WMNs),” Proceeding from ICENT’10: 2010 International Conference on Educational and Network Technology, Qinhuangdao, 25-27 June 2010, pp. 487-492. doi:10.1109/ICENT.2010.5532257
[6] F. Nait-Abdesselam, B. Bensaou and T. Taleb, “Detecting and Avoiding Wormhole Attacks in Wireless Ad-Hoc Networks,” IEEE Communication Magazine, Vol. 46, No. 4, 2008, pp. 127-133. doi:10.1109/MCOM.2008.4481351
[7] V. Zhang, J. Zheng and H. Hu, “Security in Wireless Mesh Networks,” Auerbach Publications Taylor & Francis Group, London, 2009.
[8] I. Aad, P. J. Hubaux and W. E. Knightly, “Impact of Denial-of-Service Attacks on Ad-Hoc Networks,” IEEE-ACM Transactions on Networking, Vol. 16, No. 4, 2008, pp. 791-802. doi:10.1109/TNET.2007.904002
[9] R. Jain, “The Art of Computer System Performance Analysis,” John Wiley and Sons, Inc., Hoboken, 1991.
[10] E. Cayirci and C. Rong, “Security in Wireless Ad Hoc and Sensor Networks,” John Wiley & Sons Publications, 1st Edition, Hoboken, 2009.
[11] CERT Statistics (Historical). http://www.cert.org/historical/
[12] D. Mishra, K. Y. Jain and S. Agarwal, “Behavior Analysis of Malicious Node in the Different Routing Algorithms in Mobile Ad Hoc Network (MANET),” Proceeding from ACT’09: Advances in Computing, Control and Telecommunication Technologies, Trivandrum, 28-29 December 2009, pp. 621-623.
[13] D. Bansal and S. Soffat, “Use of Cross Layer Interactions for Denial of Service Attacks in WMN,” Proceeding from NETWORKS’10: The 14th international Telecommunications, Network Strategy and Planning Symposium, Warsaw, 27-30 September 2010, pp. 1-6.
[14] R. Rangara, R. Jaipuria, G. Yenugwar and P. Jawandhiya, “Intelligent Secure Routing Model for MANET,” Proceeding from ICCSIT’10: 3rd International Conference on Computer Science and Information Technology, Chengdu, 2010, p. 452.
[15] S. Umang, B. V. R. Reddy and M. N. Hoda, “Enhanced Intrusion Detection System for Malicious Node Detection in Ad Hoc Routing Protocols Using Minimal Energy Consumption,” IET Communications, Vol. 4, No. 17, 2010, pp. 2084-2094. doi:10.1049/iet-com.2009.0616
[16] M. D. Shila, Y. Cheng and T. Anjali, “Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs,” IEEE Transactions on Wireless Communication, Vol. 9, No. 5, 2010, pp. 1661-1675. doi:10.1109/TWC.2010.05.090700
[17] S. Hashmi and J. Brooke, “Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks,” Proceeding from SECUR-WARE’10: 4th International Conference on Emerging Security Information Systems and Technologies, Venice, 18-28 July 2010, pp. 17-24.
[18] L. Hong, W. Chen, L. Gao, G. Zhang and C. Fu, “Grey Theory Based Reputation System for Secure Neighbor Discovery in Wireless Ad Hoc Networks,” Proceeding from ICFCC’10: 2nd International Conference on Future Computer and Communication, Wuhan, 21-24 May 2010, pp. V2-V749.
[19] L. Tamilselvan and V. Sankarnarayanan, “Prevention of Blackhole Attack in MANET,” Proceeding from AUS-WIRELESS’07: 2nd International Conference on Wireless Broadband and Ultraband Communications, Sydney, 27-30 August 2007, p. 21.
[20] S. Lu, L. Li, K. Lam and L. Jiya, “SAODV: A MANET Routing Protocol That Can Withstand Black Hole Attack,” Proceeding from CIS’06: International Conference on Computational Intelligence and Security, Beijing, 11-14 December 2009, pp. 421-425.
[21] E. Gerhards-Padilla, N. Aschenbruck, P. Martini, M. Jahnke and J. Tolle, “Detecting Black Hole Attacks in Tactical MANETs Using Topology Graphs,” Proceeding from LCN’07: 32nd IEEE Conference on Local Computer Networks, Dublin, 15-18 October 2007, pp. 1043-1052.
[22] A. Prathapani, L. Santhanam and P. D. Agarwal, “Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh Networks,” Proceeding from MASS’09: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, 12-15 October 2009, pp. 753-758.
[23] L. Coleman, M. Martin, T. Meurer and K. Plauche, “Honeypot Technology,” 2009. http://students.kennesaw.edu/~lec6557/Formal%20Report.htm
[24] F. Y. Alem and C. Z. Xuan, “Preventing Black Hole Attack in Mobile Adhoc Networks Using Anomaly Detection,” Proceeding from ICFCC’10: International Conference on Future Computer and Communication, Wuhan, 21-24 May 2010, pp. V3-V672.
[25] T. Krone, “Hacking Motives [PDF Document]”. http://www.aic.gov.au/publications/current%20series/htcb/1-20/htcb006.aspx

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.