Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or packet drop attack is one example of a harmful attack in mobile ad hoc networks. In this study, we implement a ser...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
IEEE (IEEE Xplore)
2014
|
Online Access: | http://psasir.upm.edu.my/id/eprint/38885/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Putra Malaysia |
id |
my.upm.eprints.38885 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.388852015-06-19T07:39:25Z http://psasir.upm.edu.my/id/eprint/38885/ Performance evaluation of time-based black hole attack detection in mobile ad hoc networks Raja Mahmood, Raja Azlina Hussin, Masnida Manshor, Noridayu Khan, A. I. Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or packet drop attack is one example of a harmful attack in mobile ad hoc networks. In this study, we implement a series of time-based black hole attack detection of different time intervals and compare the results. We study the performances of the networks, the packet delivery ratio percentage, with detection interval time of 900, 450 and 300 seconds with a total of 900 seconds of simulation time. The results suggest that appropriate time interval is critical in providing reliable detection results in timely manner. In general, the 450 seconds detection interval time has provided more reliable results, with lower false positive percentage in comparison to those of the 300 seconds detection interval time. The best explanation to the high false positive rate in the shorter detection interval time is due to the insufficient time given to the packets to arrive to the destinations during the detection process. Meanwhile, implementing the attack detection only after 900 seconds may be considered too late and thus, may have a devastating impact to the networks. IEEE (IEEE Xplore) 2014 Conference or Workshop Item NonPeerReviewed Raja Mahmood, Raja Azlina and Hussin, Masnida and Manshor, Noridayu and Khan, A. I. (2014) Performance evaluation of time-based black hole attack detection in mobile ad hoc networks. In: International Conference on Computational Science and Technology 2014 (ICCST2014), 27-28 Aug. 2014, Kota Kinabalu, Sabah, Malaysia. (pp. 1-6). 10.1109/ICCST.2014.7045187 |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
description |
Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or packet drop attack is one example of a harmful attack in mobile ad hoc networks. In this study, we implement a series of time-based black hole attack detection of different time intervals and compare the results. We study the performances of the networks, the packet delivery ratio percentage, with detection interval time of 900, 450 and 300 seconds with a total of 900 seconds of simulation time. The results suggest that appropriate time interval is critical in providing reliable detection results in timely manner. In general, the 450 seconds detection interval time has provided more reliable results, with lower false positive percentage in comparison to those of the 300 seconds detection interval time. The best explanation to the high false positive rate in the shorter detection interval time is due to the insufficient time given to the packets to arrive to the destinations during the detection process. Meanwhile, implementing the attack detection only after 900 seconds may be considered too late and thus, may have a devastating impact to the networks. |
format |
Conference or Workshop Item |
author |
Raja Mahmood, Raja Azlina Hussin, Masnida Manshor, Noridayu Khan, A. I. |
spellingShingle |
Raja Mahmood, Raja Azlina Hussin, Masnida Manshor, Noridayu Khan, A. I. Performance evaluation of time-based black hole attack detection in mobile ad hoc networks |
author_facet |
Raja Mahmood, Raja Azlina Hussin, Masnida Manshor, Noridayu Khan, A. I. |
author_sort |
Raja Mahmood, Raja Azlina |
title |
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks |
title_short |
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks |
title_full |
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks |
title_fullStr |
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks |
title_full_unstemmed |
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks |
title_sort |
performance evaluation of time-based black hole attack detection in mobile ad hoc networks |
publisher |
IEEE (IEEE Xplore) |
publishDate |
2014 |
url |
http://psasir.upm.edu.my/id/eprint/38885/ |
_version_ |
1643832262926532608 |