Performance evaluation of time-based black hole attack detection in mobile ad hoc networks

Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or packet drop attack is one example of a harmful attack in mobile ad hoc networks. In this study, we implement a ser...

Full description

Saved in:
Bibliographic Details
Main Authors: Raja Mahmood, Raja Azlina, Hussin, Masnida, Manshor, Noridayu, Khan, A. I.
Format: Conference or Workshop Item
Published: IEEE (IEEE Xplore) 2014
Online Access:http://psasir.upm.edu.my/id/eprint/38885/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Putra Malaysia
id my.upm.eprints.38885
record_format eprints
spelling my.upm.eprints.388852015-06-19T07:39:25Z http://psasir.upm.edu.my/id/eprint/38885/ Performance evaluation of time-based black hole attack detection in mobile ad hoc networks Raja Mahmood, Raja Azlina Hussin, Masnida Manshor, Noridayu Khan, A. I. Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or packet drop attack is one example of a harmful attack in mobile ad hoc networks. In this study, we implement a series of time-based black hole attack detection of different time intervals and compare the results. We study the performances of the networks, the packet delivery ratio percentage, with detection interval time of 900, 450 and 300 seconds with a total of 900 seconds of simulation time. The results suggest that appropriate time interval is critical in providing reliable detection results in timely manner. In general, the 450 seconds detection interval time has provided more reliable results, with lower false positive percentage in comparison to those of the 300 seconds detection interval time. The best explanation to the high false positive rate in the shorter detection interval time is due to the insufficient time given to the packets to arrive to the destinations during the detection process. Meanwhile, implementing the attack detection only after 900 seconds may be considered too late and thus, may have a devastating impact to the networks. IEEE (IEEE Xplore) 2014 Conference or Workshop Item NonPeerReviewed Raja Mahmood, Raja Azlina and Hussin, Masnida and Manshor, Noridayu and Khan, A. I. (2014) Performance evaluation of time-based black hole attack detection in mobile ad hoc networks. In: International Conference on Computational Science and Technology 2014 (ICCST2014), 27-28 Aug. 2014, Kota Kinabalu, Sabah, Malaysia. (pp. 1-6). 10.1109/ICCST.2014.7045187
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
description Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or packet drop attack is one example of a harmful attack in mobile ad hoc networks. In this study, we implement a series of time-based black hole attack detection of different time intervals and compare the results. We study the performances of the networks, the packet delivery ratio percentage, with detection interval time of 900, 450 and 300 seconds with a total of 900 seconds of simulation time. The results suggest that appropriate time interval is critical in providing reliable detection results in timely manner. In general, the 450 seconds detection interval time has provided more reliable results, with lower false positive percentage in comparison to those of the 300 seconds detection interval time. The best explanation to the high false positive rate in the shorter detection interval time is due to the insufficient time given to the packets to arrive to the destinations during the detection process. Meanwhile, implementing the attack detection only after 900 seconds may be considered too late and thus, may have a devastating impact to the networks.
format Conference or Workshop Item
author Raja Mahmood, Raja Azlina
Hussin, Masnida
Manshor, Noridayu
Khan, A. I.
spellingShingle Raja Mahmood, Raja Azlina
Hussin, Masnida
Manshor, Noridayu
Khan, A. I.
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
author_facet Raja Mahmood, Raja Azlina
Hussin, Masnida
Manshor, Noridayu
Khan, A. I.
author_sort Raja Mahmood, Raja Azlina
title Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
title_short Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
title_full Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
title_fullStr Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
title_full_unstemmed Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
title_sort performance evaluation of time-based black hole attack detection in mobile ad hoc networks
publisher IEEE (IEEE Xplore)
publishDate 2014
url http://psasir.upm.edu.my/id/eprint/38885/
_version_ 1643832262926532608