E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs

Vahid Heydari, Seong Moo Yoo

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

Mobile ad hoc networks (MANETs) rely on the benevolence of nodes within the network to forward packets from a source node to a destination node. This network construction allows for the forwarding nodes, whether they are selfish or malicious, to drop packets hindering end-to-end communication. In this paper, a new scheme is proposed against collusion black hole and slander attacks in MANETs, named E2EACK. A novel method is used to detect collusion attacks due to collusive malicious nodes which cooperate in the route discovery, but refuse to forward data packets and do not disclose the misbehavior of each other. Contrary to existing methods that detect only collusion black hole attacks, the E2EACK also detects slander attacks and framing attacks. Moreover, the E2EACK uses ACKnowledgment packet to detect malicious nodes on the path and Message Authentication Code (MAC) to authenticate the sender of each data packet. Analytical and simulation results show that the proposed scheme considerably decreases the routing overhead and increases the packet delivery ratio compared to the existing methods.

Original languageEnglish (US)
Pages (from-to)2259-2273
Number of pages15
JournalWireless Networks
Volume22
Issue number7
DOIs
StatePublished - Oct 1 2016
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs'. Together they form a unique fingerprint.

Cite this