Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack...

10
1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEE Transactions on Mobile Computing 1 Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks Nadav Schweitzer, Ariel Stulman, Member, IEEE, Asaf Shabtai and Roy David Margalit Abstract—Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Pre- vention, however, attempts at thwarting an attack before it is executed. Both techniques can be realized either by the collective collaboration of network nodes (i.e. adding security messages to protocols) or by internal deduction of attack state. In this paper we propose a method for minimizing the gray-hole DoS attack. Our solution assumes no explicit node collaboration, with each node using only internal knowledge gained by routine routing information. The technique was evaluated using 5 different threat models (different attacker capabilities), allowing for a better understanding of the attack surface and its prevention. Our simu- lation results show a decrease of up to 51% in previously dropped packet, greatly minimizing gray-hole attack effectiveness. Index Terms—MANET, OLSR, Gray-Hole Attack, DCFM. I. I NTRODUCTION A With the growth in the use of MANETs, as a stand- alone networking tool and as the basis for other emerging technologies such as IoT and VANETs [1] the demand for security on this underlying technology is increasing as well. Ubiquitous MANET protocols (i.e., AODV [2], DSDV [3], OLSR [4], etc.), however, were developed with the focus on efficient routing and data transfer performance, not security issues. This, in turn, led to the current situation where these protocols are vulnerable to a multitude of attacks, including spoofing attacks [5], flooding attacks [6], wormhole attacks [7], replay attacks [8], [6], black-hole attacks [9], colluding mis-relay attacks [10], and many others. Black-hole attack [9], and the more general gray-hole attack [11], on MANETs, are manifested when a malicious node is able to silently discard some (gray-hole) or all (black- hole) of the messages passing through it. The attack can be further amplified if the attacker is able to cunningly manipulate routing tables so as to increase the probability that messages would be routed through it. Of the two attacks, gray-hole is more devastating and of higher sophistication, as it selectively discards messages, making detection and/or avoidance difficult [12], [13]; rendering anti-black-hole algorithms such as [14] useless [15]. Thus, mitigation of the gray-hole attack will also solve the more famous black-hole attack as well. Denial Contradictions with Fictitious Node Mechanism (DCFM) [16], is an algorithm devised to specifically address Nadav Schweitzer and Asaf Shabtai are with the Department of Information Systems Engineering, Ben-Gurion University, Beer-Sheva, Israel, e-mails: [email protected],[email protected]. Ariel Stulman and Roy David Margalit are with the Department of Computer Science, Jerusalem College of Technology, Jerusalem, Israel, e- mails: {stulman,roydavid}@jct.ac.il. a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. DCFM’s main virtues are its ability to mitigate the node isolation attack by relying solely on internal knowledge acquired by each node during routine routing and in utilizing the same technique used for the attack to prevent damage. As both node isolation and gray-hole attacks require similar preliminary steps for attack execution, namely coaxing a victim into appointing the attacker as sole multi-point relay (MPR) node, which is responsible for broadcasting a node’s existence to the network (see section II-A for further details), we found DCFM to be a good basis for mitigating the gray-hole attacks as well. As it turns out, although being a sole MPR isn’t a requirement for gray-hole attacks to commence (albeit, without guarantee, as choosing a path through the attacker is equally viable as other alternative paths - see Appendix), the information provided by DCFM can be used to minimize it as well. These techniques, dubbed IMP (short for IMProvement), were implemented in the NS3 [17] simulator, with results showing an improved detection rate of up to 51% of all previously dropped packages. The reminder of this paper is organized as follows. In Section II-A the OLSR protocol is presented; then, the gray- hole attack is described. In Section II-C we briefly present the DCFM algorithm. The method for protecting OLSR MANET from gray-hole attack using DCFM is described in Section III. Section IV describes the simulation model and presents the results achieved along with a discussion of the results. Previous works related to OLSR security as well as to the gray- hole attack are discussed in Section V. Finally, conclusions and future works are presented in Section VI. II. BACKGROUND A. OLSR overview The Optimized Link State Routing protocol (OLSR) is a proactive routing protocol designed for large and dense networks, and highly recommended for VANETs as well [1], [18], [19], [20], [21]. The OLSR protocol is an optimization of the classical Link-State Routing protocol (LSR), aimed at reducing network overhead. While the original LSR uses a flooding propagation technique in which a node receiving any message must re-transmit it to all its neighbors, OLSR selectively re-transmits messages based on a specified set of rules. The crux of the optimization is based upon a subset of 1-hop neighbors, called multi-point relays (MPR), which are designated as forwarding agents for control packets throughout the network. MPRs are selected by a node as a subset of its 1-hop neighbors, such that the MPR set allows coverage of all of its

Transcript of Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack...

Page 1: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

1

Contradiction Based Gray-Hole AttackMinimization for Ad-Hoc Networks

Nadav Schweitzer, Ariel Stulman, Member, IEEE, Asaf Shabtai and Roy David Margalit

Abstract—Although quite popular for the protection for ad-hocnetworks (MANETs, IoT, VANETs, etc.), detection & mitigationtechniques only function after the attack has commenced. Pre-vention, however, attempts at thwarting an attack before it isexecuted. Both techniques can be realized either by the collectivecollaboration of network nodes (i.e. adding security messages toprotocols) or by internal deduction of attack state. In this paperwe propose a method for minimizing the gray-hole DoS attack.Our solution assumes no explicit node collaboration, with eachnode using only internal knowledge gained by routine routinginformation. The technique was evaluated using 5 different threatmodels (different attacker capabilities), allowing for a betterunderstanding of the attack surface and its prevention. Our simu-lation results show a decrease of up to 51% in previously droppedpacket, greatly minimizing gray-hole attack effectiveness.

Index Terms—MANET, OLSR, Gray-Hole Attack, DCFM.

I. INTRODUCTION

AWith the growth in the use of MANETs, as a stand-alone networking tool and as the basis for other emerging

technologies such as IoT and VANETs [1] the demand forsecurity on this underlying technology is increasing as well.Ubiquitous MANET protocols (i.e., AODV [2], DSDV [3],OLSR [4], etc.), however, were developed with the focus onefficient routing and data transfer performance, not securityissues. This, in turn, led to the current situation where theseprotocols are vulnerable to a multitude of attacks, includingspoofing attacks [5], flooding attacks [6], wormhole attacks[7], replay attacks [8], [6], black-hole attacks [9], colludingmis-relay attacks [10], and many others.

Black-hole attack [9], and the more general gray-hole attack[11], on MANETs, are manifested when a malicious nodeis able to silently discard some (gray-hole) or all (black-hole) of the messages passing through it. The attack can befurther amplified if the attacker is able to cunningly manipulaterouting tables so as to increase the probability that messageswould be routed through it. Of the two attacks, gray-hole ismore devastating and of higher sophistication, as it selectivelydiscards messages, making detection and/or avoidance difficult[12], [13]; rendering anti-black-hole algorithms such as [14]useless [15]. Thus, mitigation of the gray-hole attack will alsosolve the more famous black-hole attack as well.

Denial Contradictions with Fictitious Node Mechanism(DCFM) [16], is an algorithm devised to specifically address

Nadav Schweitzer and Asaf Shabtai are with the Department of InformationSystems Engineering, Ben-Gurion University, Beer-Sheva, Israel, e-mails:[email protected],[email protected].

Ariel Stulman and Roy David Margalit are with the Department ofComputer Science, Jerusalem College of Technology, Jerusalem, Israel, e-mails: {stulman,roydavid}@jct.ac.il.

a denial of service (DoS) attack variant called node isolation[4] in OLSR based networks. DCFM’s main virtues are itsability to mitigate the node isolation attack by relying solelyon internal knowledge acquired by each node during routinerouting and in utilizing the same technique used for the attackto prevent damage. As both node isolation and gray-holeattacks require similar preliminary steps for attack execution,namely coaxing a victim into appointing the attacker assole multi-point relay (MPR) node, which is responsible forbroadcasting a node’s existence to the network (see sectionII-A for further details), we found DCFM to be a good basisfor mitigating the gray-hole attacks as well. As it turns out,although being a sole MPR isn’t a requirement for gray-holeattacks to commence (albeit, without guarantee, as choosing apath through the attacker is equally viable as other alternativepaths - see Appendix), the information provided by DCFM canbe used to minimize it as well. These techniques, dubbed IMP(short for IMProvement), were implemented in the NS3 [17]simulator, with results showing an improved detection rate ofup to 51% of all previously dropped packages.

The reminder of this paper is organized as follows. InSection II-A the OLSR protocol is presented; then, the gray-hole attack is described. In Section II-C we briefly present theDCFM algorithm. The method for protecting OLSR MANETfrom gray-hole attack using DCFM is described in SectionIII. Section IV describes the simulation model and presentsthe results achieved along with a discussion of the results.Previous works related to OLSR security as well as to the gray-hole attack are discussed in Section V. Finally, conclusions andfuture works are presented in Section VI.

II. BACKGROUND

A. OLSR overviewThe Optimized Link State Routing protocol (OLSR) is

a proactive routing protocol designed for large and densenetworks, and highly recommended for VANETs as well [1],[18], [19], [20], [21]. The OLSR protocol is an optimizationof the classical Link-State Routing protocol (LSR), aimedat reducing network overhead. While the original LSR usesa flooding propagation technique in which a node receivingany message must re-transmit it to all its neighbors, OLSRselectively re-transmits messages based on a specified set ofrules. The crux of the optimization is based upon a subset of1-hop neighbors, called multi-point relays (MPR), which aredesignated as forwarding agents for control packets throughoutthe network.

MPRs are selected by a node as a subset of its 1-hopneighbors, such that the MPR set allows coverage of all of its

Page 2: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

2

2-hop neighbors. By minimizing its MPR selections, a node isable to transmit messages to all 2-hop neighbors with minimalduplication. Thus, both topology control messages and datapackets are only forwarded by this minimal MPR set, allowingfor fewer duplicate messages while maintaining network-widecoverage.

There are two types of messages used to discover networktopology in OLSR: HELLO and TC (i.e., topology control).The HELLO message, which declares a node’s knowledge ofits surrounding, is broadcast to all neighboring nodes. Anynode that can hear the broadcast and reciprocate back to thesender is classified as a 1-hop neighbor. Consequently, eachnode acquires its local topology up to a 2-hop range.

In addition, OLSR requires that all nodes selected as MPRsperiodically advertise a TC message listing all nodes that haveselected the sender as its MPR. These control messages areonly propagated through the MPR super-network, reducingoverall network traffic.

Each node in the network maintains network topology basedon both the HELLO and TC messages it receives. It thencalculates and stores, for each node discovered, the shortestdistance (i.e., the minimal required hops between the sourceand the destination) between itself and one of the destination’snode MPRs; hence, the shortest path to the destination. See[22] for more details.

B. black- and gray-hole attack

Black holes in the network refers to locations where mali-cious nodes discard network traffic without the source beingnotified that the packet did not reach the requested destination.Regardless of the mobile routing protocol, every node on thepath between the source and destination is a potential black-hole attacker. The attack surface can be enhanced, however,with specific steps executed by the attacker to increase theprobability of landing on the path to/from a specific (or all)victim(s). Thus, our main concern with black-holes, albeit notthe only concern, is when a node can illegitimately coerce thetopology so as to be placed on the path between the victimand some other node, more than the random chance of suchan occurrence.

Black-hole is a special case of the more general gray-hole,in which packets are selectively dropped while allowing othersthrough. In this paper we focus on the case in which theattacker selectively forwards data packets of every node exceptthe victim’s. It does not try to isolate the victim; thus, controlpackets are forwarded.

An OLSR based network is vulnerable to gray-hole attack.The attacker may send, for instance, a bogus HELLO messagesto its 1-hop neighbors, claiming to know more 1-hop neighborsthan it actually does. This will illegitimately increase itsprobability of being chosen as a sole MPR by its neighbors.The more neighbors an attacker claims to have, the larger thepotential impact of the attack.

Consider Figure 1, depicting a specific network topology,where x is an attacker and v a victim. x advertises a bogusHELLO message containing {f, v, g}; namely, v and each ofits 2-hop neighbors, and adds a fictitious Fx in order to ensure

Figure 1. Example of a gray-hole attack: node x claims to know every 2-hopneighbor of v, as well as Fx, a non-existent node.

the attack’s success. Being the most cost-effective node in v‘sview of the network topology, it nominates x as its sole MPR.From here the attack can easily commence, as nodes fromall around the network will direct data traffic destined for vtowards x, who can drop packets at will.

C. Denial Contradictions with Fictitious Node Mechanism(DCFM)

DCFM was proposed by [16] in order to address the prob-lem of node isolation in OLSR based networks. It identifiespotential malicious nodes trying to falsify HELLO messagesusing only internal information within the victim, withoutrelying on any centralized or external trusted party. Such earlydetection prevents a possible attack before it can manifest.DCFM verifies the validity of a HELLO message by lookingfor contradictions between what the message claims and itspre-acquired topological knowledge. According to DCFM,sole MPRs nominations are allowed only when no contra-dictions are found. With the presence of contradictions, anMPR can be nominated for all 2-hop neighbors for which thesuspected node is the only access point. It cannot, however,be nominated as sole MPR for 2-hop neighbors that can bereached through other paths. Following [23], and as justifiedin [16], in this work we assume that TC messages cannot bespoofed.

1) notation: Following [16] we use the notation below forthe remainder of this work:

• V denote the set of all nodes in the network,• v , x ∈ V are the victim (as well as/or the receiver) and

attacker nodes, respectively,• Fx is a fictitious node advertised by x,• ADJ(v) ⊂ V is the set of all 1-hop neighbors of v,• ADJ2 (v) ⊂ V is the set of all 2-hop neighbors of v,• MPR (v) ⊆ ADJ (v) is the set of 1-hop nodes of v who

appointed v as their MPR, and• MPR

′(v) ⊆ ADJ (v) is the set of 1-hop nodes who were

selected by v as MPRs.2) contradiction rules: DCFM defines three rules that must

be satisfied before a HELLO message sender is consideredtrustworthy. Only trusted senders can be nominated as soleMPRs for 2-hop nodes that can otherwise be reached, subject

Page 3: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

3

to the OLSR protocol. A detailed explanation of these contra-diction rules and their inherent logic can be found in [16]:

1) When node x advertises a HELLO message containingADJ(x). For every node z ∈ ADJ(x) ∩ ADJ(v), vshould verify that x ∈ ADJ(Z).

Figure 2. Sample node topology for identifying contradictions

Rule No. 1 can be explained by Figure 2 in whichADJ(v) = {x, u, z} and x is an attacker. x advertisesa HELLO message claiming to know the set of ADJ2 (v)containing z (since z is a v’s 2-hop neighbor through u).However, z ∈ ADJ(y) and since z has not included x inits HELLO message, v suspects x.

2) For each node y mentioned in a HELLO message, vshould check whether there exists z ∈ ADJ(y), such that(a) z /∈ ADJ(x); hence, not mentioned in x’s HELLOmessage and (b) y ∈ ADJ2 (v); thus, z is located at least3-hops away from v. Once these conditions are fulfilled,(c) it must check if x appointed w ∈ ADJ(x) as MPRfor covering z?

Figure 3. By advertising a non existing link (x, d), x attacks the node v

Consider Figure 3 where ADJ(v) = {x, u} andADJ2 (v) = {d}. OLSR requires v to select u as its MPR sothat ADJ2 (v) is covered. A malicious x, interested in beingelected as a sole MPR of v, will claims that d ∈ ADJ(x).Since z /∈ ADJ(x), but according to x’s advertisementz ∈ ADJ2 (x ), x should have appointed d ∈ ADJ(x) asan MPR for covering z. This cannot happen, indicating acontradiction.

3) v must treat a HELLO message containing all nodes ofthe network except for ADJ(v), as a potential attack.

Nodes must apply each of the mentioned rules sequentially,advancing from one rule to the next iff there are no contradic-tions. Failure of any of the rules would require that v appointx as a sole MPR only for the nodes that were exclusivelydeclared in its HELLO message.

For more details about DCFM, the interested reader isreferred to [16] where this claim is corroborated.

III. PREVENTING THE GRAY-HOLE ATTACK USING DCFM

The original DCFM was developed in order to identify andprevent the node isolation attack. In the gray-hole attacks,however, this solution is incomplete. Attackers can still or-chestrate their attack by dropping data packets that were to berouted through them – even when they were not appointed assole MPRs.

Figure 4. Illustrating the same network of Figure 1 with the protection ofDCFM

Avoidance of selecting a suspected node as a sole MPR,which is the crux of DCFM, mainly prevents the gray-holeattack. There are, however, two additional venues in whicha malicious node can circumvent DCFM based protection:(1) when it is a natural candidate for passing data fromADJ2 (v) to v; and (2) when topology restraints require thatit be appointed as sole MPR, i.e., when there is no otherconnection to some node. Our simulations show that althoughthe probability of attack success is less in either of theseattack venues when compared to the main venue, non-the-less it is still feasible. Using internal knowledge gained byDCFM, we present an improved method denoted by IMP(short for IMProvement), as a method of further decreasingattack success to include these two venues as well.

Figure 4 illustrates the same network of Figure 1, withfictitious nodes advertised by a, i, g, s, and h in accordancewith the fictitious node mechanism of DCFM [16]. x hasnot nominated any MPR for covering {s, Fg} ∈ ADJ (g)despite x’s (false) claim that g ∈ ADJ(x); hence, {s, Fg} ∈ADJ2 (x ). Using DCFM rules, v identifies the malicious intentof the attacker x, and refrains from nominating x as a soleMPR; thus, MPR

′(v) = {a, i , x , e}.

We point out that although ADJ (x) = {v, f, g, Fa, Fi, Fx},or so it (falsely) claims, MPR

′(v)− {x} 6= Ø, as others are

also appointed into MPR′(v). More importantly, however,

it must be noticed that x ∈ MPR′(v), in spite of being

suspected. This is required for accessing {Fx} the set of nodesadvertised exclusively by x, and is essential for MANETsinitialization and further evolvement. Now x is in the positionof attacking v despite DCFM’s protection, using one of thesupplemental attacks described above.

Page 4: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

4

Consider the case, for the topology depicted in Figure 4,where h sends a message to v. Since the shortest path goesthrough f , h delivers the message to f . As f ∈ ADJ2 (v), itgets to choose a path going through one of the three nodesx, n or e irrespective of who was appointed MPR for v. Thatis, the probability that packets travel to the victim through theattacker is still high.

To deal with these problems we propose using DCFM’scontradiction rules to further influence routing decisions. Notonly will we decide who should be in MPR

′(v), but other

nodes in the network also make data routing decisions – onthe fly – based on the previous outcomes of the rules. Wecall this improvement IMP, which can be summarized byAlgorithm 1 in which k is a node on the optimal path betweenthe source and destination nodes, and d ∈ ADJ2 (k) locatedfurther down the path.

Algorithm 1 IMPIMP(k,d)

S ← (ADJ (k) ∩ADJ (d))for each x ∈ S do

mark x as suspect or legitimate using Algorithm 1of DCFM [16, Section 3]

if x marked as legitimate or |S| = 1 doreturn x

elseS ← S - {x}

In Figure 4, besides v, f will also suspect x as mali-cious. In f ’s view of the network, x’s HELLO messagecontains a contradiction. x is advertising that ADJ (v) ={v, f, g, Fa, Fi, Fx}. Rule No. 2, however, proves to f that xis lying and g isn’t a neighbor of x. f will refrain from routingdata through x if other suitable options exist (e.g. nodes n ore). Of course, lacking better options, nodes would must stillroute data through suspicious nodes.

Simulation found that in some cases this route choosingmechanism has increased the number of delivered packets by20% beyond what was achieved using simple DCFM; this,without any additional cost.

As augmenting DCFM with IMP for preventing the gray-hole attack does not increase network overhead beyond whathas been discussed in [16] for DCFM, we claim that thenetworking cost if IMP is negligible.

IV. EVALUATION

Since network topologies are infinite, expected benefit es-timation must be achieved through simulation. In this sectionwe describe the varied simulations that were ran in order tojustify the using of IMP for preventing gray-hole attacks.

A. simulation

We used the built-in OLSR module in the network simulatorNS3 [17]. It was augmented to run DCFM in accordance withthe protocol above. All simulation value sets were run ~1000times, with values reported as averages over these results. The

movement, where relevant, was 1.5-2 m/s (5.4-7.2 km/h). Thetransmission range was about 250 meters.

A set of simulations was designed to test the effectivenessof DCFM against gray-hole attacks. For this purpose we useda random network topology with a varying number of nodes,fluctuating network density from 30 to 100 nodes in an area of750x1000m. A simulation round without connectivity betweenits components was discarded, and was not taken into accountin the calculated outcome.

In each simulation, three predefined nodes were used: avictim, an attacker, and a source node used for sendingmessages to the victim. Both the victim and the source nodeswere randomly placed. We require, however, that victim andsource must be at least 2-hops from each other, discardingsimulations not satisfying this requirement. Justification ofthis constraint is based on the observation that victim andsource that are 1-hop neighbors are inherently protected fromattackers, and renders all other protection superfluous.

The attacker was designed with one of the 5 followingdifferent capabilities:

I. Passive Silent attacker (PSV ). This attacker was ran-domly placed within the network. It has done nothing forincreasing its chances of becoming a routing node for thepackets (in order to drop them). Results of this attackertype were used as a baseline for the gray-hole attack whencompared with the more sophisticated attacks.

II. Randomly located attacker (RND). Similar to thepassive attacker, this malicious node is randomly placedwithin the network. It differs by the fact it would try toget itself appointed as a sole MPR of the victim wheneverthey are 1-hop neighbors.

III. Initially 1-hop neighbor attacker (1HOP ). Attackerwho is initially located as a 1-hop neighbor of the victim.This attacker is similar to the one above, except its initialposition isn’t random. It is purposely placed close enoughto the victim so as they will begin as 1-hop neighbors.

IV. Shadow attacker (SHDW ). This attacker was giventhe capability of shadowing the victim’s movements froma distance of 190 meters, constantly remaining a 1-hopneighbor of the victim. This distinguishes it from theprevious attacker who only begins as a neighbor, but thedistance can increase as the simulation commences.

V. MITM attacker (MITM). This attacker, improves theability of the shadow attacker. Not only does it remain a1-hop neighbor poised for attack, it is given awareness forthe source node location. This allows it to locate itself ona line between the two nodes, increasing the likelihood ofbeing on the shortest path between the source and victim.

For each of the attackers, we examined the follow cases:

(a) The package arrived at its destination (arrived).(b) The package was lost by third party on its way for some

obscure reason irrespective of the attacker (lost3rd).(c) The package was dropped by the attacker, who (by

chance or orchestrated) is a neighbor to the victim, eventhough there was at least one other node who could haveforwarded the packet (attackerNeighbour).

Page 5: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

5

(d) The package was dropped by the attacker, who (by chanceor orchestrated) is a neighbor to the victim, but was theonly route available (attackerSingleNeighbor).

(e) The package dropped by the attacker located at least 2-hop from the victim (attacker).

We hypothesized that attackerNeighbour can be mostlyinfluenced by IMP. lost3rd and attacker should not beinfluenced beyond some random, independent change. No im-provement should be noticed for attackerSingleNeighbor,as IMP cannot change network topology; merely, choosewisely between equivalent paths. With a single path to thevictim, there are no alternate options that circumvent theattacker for IMP to choose from.

Each simulation was run without any attack, under attackwithout any protection, under attack while under DCFM pro-tection and, under attack while under IMP protection. This wasrepeated both with and without movement of the participatingnodes.

B. results

Figures 5 and 6 show the percentage of dropped messagesby each attacker for different population sizes in networks withmovement (M) and without movement (NM), respectively.

Figure 5. Attack impact for each attacker with fluctuating population densityin a network with movement

As can be seen in both graphs the attackers’ maximumsuccess is when the population density is lowest (30). Inaddition, as expected, The MITM attacker is strongest whilethe PSV attacker is usually the weakest.

For this reason we developed IMP – the improvement ofDCFM. Simulations show that even in the relatively limiteddamage of the attacker, IMP increases the number of thereceived messages and minimizes the damage caused by theattack. Moreover, the sparser the network, the greater theimpact of IMP.

Figures 7-16 present the percentage of the arrived messageswith attack (UA) and without attack (NA), under attack withthe protection of simple DCFM (DCFM) and under attackwith the protection of IMP (IMP), with (M) and without (NM)movement of the participating nodes for each of the attackergroups. In each figure, The X-axis represents the number of

Figure 6. Attack impact for each attacker with fluctuating population densityin a network without movement

Figure 7. The PSV attacker - M Figure 8. The PSV attacker - NM

Figure 9. The RND attacker - M Figure 10. The RND attacker -NM

Figure 11. The 1HOP attacker -M

Figure 12. The 1HOP attacker -NM

nodes in a random network topology – from 30 to 100 – whilethe Y-axis represents the percentage of arrived messages ineach of the scenarios.

C. improvement analysis

To better understand the improvement obtained by IMP, weanalyzed the different causes for dropped packets (see IV-Aoptions (b)-(e)). This allowed us to pinpoint the decrease ofdropped messages due to IMP as a percentage of all previously

Page 6: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

6

Figure 13. The SHDW attacker- M

Figure 14. The SHDW attacker-NM

Figure 15. The MITM attacker- M

Figure 16. The MITM attacker- NM

dropped packets. We justify this technique so we can checkwhether IMP improved the results, or some other independentexternal factor (i.e., lost3rd or attacker).

Figure 17. The dissection of dropped and saved packets under differentprotection schemes for each type of attacker in a 30-node network withoutmovement

The bar-chart of Figure 17 depict a dissection of discardedmessages in a 30-node network without any movement. Foreach attacker class (the PSV attacker isn’t shown as its resultscannot be influenced by IMP) we examine the results whenunder attack (UA) without any protection, with DCFM active(DCFM), and when IMP is active as well (IMP). The differentreasons for un-successful communication ((c)-(e)) are shown.In addition, we also show the percentage of packets thatdo arrive with DCFM or IMP in place, which denotes thepercentage of saved packets (SP); in essence, the successfulimprovement of this protection technique.

When comparing the results, one can deduce that althoughDCFM improves on the arrival ratio, IMP further improvesthis success percentage. And although DCFM improvementsstart at a low of 1% for the MITM attacker to a high of 27%

for the SHDW attacker, IMP improvement are never lowerthan 30% (for the 1HOP attacker) and reach a maximum of51% for the SHDW attacker.

It is noteworthy to mention that the majority of savedpackets come from attackerNeighbour, as IMP tries and hasthe opportunity to circumvent the attacker due to the existenceof an alternative path for forwarding packets.

Figure 18. The dissection of dropped and saved packets under differentprotection schemes for each type of attacker in a 30-node network withmovement

Similar data is shown in Figure 18; a 30-node densenetwork that allows random movement (M) based on the rulesdescribed in IV-A. Again, we ignore the PSV attacker as IMPcannot (and does not) influence its results. We do, however,include lost3rd as one of the causes for dropped packets.Node movement create spontaneous communication outages,lost links, etc. which are valid reasons for losing messages.

For each attacker using IMP there is a noticeable (7% for theRND attacker to 30% for the SHDW attacker) decrease ofdropped messages, where most of the improvement came fromattackerNeighbour – as expected. This is in stark contrastto DCFM where besides a maximum of 17% improvementratio, we can also notice a 6% increase of dropped messagesfor the RND attacker (denoted as a negative number of savedpackets (SP)).

The rest of the figures show other sample results, fordifferent node densities with (M) or without (NM) movements.

V. RELATED WORK

Black holes are well studied for AODV routing protocol[24], and are achieved by having a malicious node reply toevery route request it hears. It then drops packets that arerouted through it, creating a black hole in the network.

In [25], the authors suggest an intrusion detection system(IDS) in order to prevent selective black hole attacks at anAODV protocol based network. Their solution assumes severalIDS nodes are deployed in MANETs in order to detect andprevent the attacks. Each of these nodes has to continually sniffall routing packets within its transmission range. This solutionis problematic in terms of MANET because it assumes thatthere are third-parties in the network and the overhead is high.

Page 7: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

7

Figure 19. The dissection of dropped and saved packets under differentprotection schemes for each type of attacker in a 40-node network withoutmovement

Figure 20. The dissection of dropped and saved packets under differentprotection schemes for each type of attacker in a 40-node network withmovement

In addition, in case one of the IDS nodes is malicious itself,nothing can prevent the attack.

TOGBAD, a solution proposed by Gerhards-Padilla, et al.[9], uses a central node to thwart attacks. Sensors placedthroughout the network help in creating a central topologygraph, with a neighbor count stored for every node. This countis then compared to the number of neighbors each node claimsto have. A node will be declared malicious if the differenceis greater than some predetermined threshold.

This solution requires sensors throughout the network, andsome central, all-knowing master node. Both requirementscounter MANET’s declared purpose; namely, that networkscan be setup ad-hoc. These networks must be preconfiguredwith trustworthy sensors and must have all nodes succumb toa central trusted third party. IMP avoids these requirements.In addition, TOGBAD opens up a new attack venue, as nodescan cause others to be declared malicious by forwarding falseinformation to TOGBAD regarding some potential victim.

[26] proposed to use security monitoring nodes (SMNs), aset of trusted nodes, as a solution against cooperative black

Figure 21. The dissection of dropped and saved packets under differentprotection schemes for each type of attacker in a 50-node network withoutmovement

Figure 22. The dissection of dropped and saved packets under differentprotection schemes for each type of attacker in a 50-node network withmovement

hole attack in mobile ad-hoc networks. SMNs are activatedonly if the comparison between a message sequence numberand a threshold value, computed by the expected packets andtheir corresponding ACKs passing between the source anddestination nodes, is abnormal. Once a suspicious node isdetected, the SMNs broadcast this knowledge to the network.

This solution suffers from the same problems of TOGBAD;mainly, the assumption that trusted nodes exist in the MANETand the introduction of an ALARM packet which itself is asecurity vulnerability.

[27] deals with a cooperative black hole attack. By addingtwo control packets called 3-hop ACK and HELLO-rep, anode can verify whether a candidate node is legitimate or not.The solution requires that each MPR node know its 3-hopneighbor set, in order to be able to discern whether a maliciousnode, sitting out of its transmission range, misuses transmittedTC messages. It also requires that each MPR node forwardall TC messages from its MPR selectors even if multiplecopies of the message are received. As a result, a node candistinguish whether a TC message is dropped intentionally

Page 8: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

8

by a malicious node or by a legitimate node just because ofthe duplication of two TC messages. This solution is flawedas two consecutive attackers (one in ADJ2 and the other inthe 3-hop neighbor set) cannot be detected. And although theresults show a high detection rate under various scenarios, therequired communication overhead is substantial.

In [10], Kannhavong et al. attempt to mitigate the problemof colluding attackers. By modifying the HELLO messageto include all 2-hop neighbors, a node can detect existingcontradictions between messages, thus identifying an attack.Of course, as the authors themselves noted, it is difficultto distinguish between contradictions which occur due to anattack as opposed to those resulting from topology changes.In addition, such contradictions identify an attack but fail toidentify the culprit.

Raffo et al. [5] propose a mechanism to improve the securityof the OLSR routing protocol against external attackers. Intheir solution, each node signs its HELLO and TC messages.These signatures are later used by others to prove their ownHELLO and TC messages. The resulting solution preventsdevices from declaring imaginary links with known nodes.This solution functions correctly preventing spoofing links butfails where (1) the attacker is a natural candidate for passingdata or (2) the attacker was nominated as an MPR for someother node. In those two cases the attacker still can droppackets going through it. IMP, however, checks whether aparticular node is suspected, and eliminates the possibility ofthe package passing through it.

In addition, their mechanism is expensive in terms ofadditional overhead: signing the messages requires extensivecomputation, a cumulative factor that grows as the size ofthe network increases. Another problem is the fact that thenetwork loses its spontaneity as all nodes are required to knoweach other in advance in order to share their public keys. Thisprevents the network from naturally evolving from the variousnodes that appear at a certain place and time, a fundamentaltrait of MANETs.

Chen et al. [20] propose a method to create a trusted routingon VANET. Although their method can help in the preventionof illegal access, impersonation attack, link spoofing etc., itcannot help in the case where a legitimate node turns maliciousafter authentication. Their approach demands prior knowledgeof network players, a demand which cannot be guaranteedin ad-hoc networks and should not be required for VANETseither. Finally, their solution requires high network overhead.

The authors of [28] claim that the damage caused bythe attack of black- and gray-hole to MANET based OLSRprotocol is less significant when compared to the damagecaused by the same attackers in other protocols (e.g. AODV,DSDV). The authors check the Packet Delivery Ration (PDR),namely, the Ratio of sent data packets from source to datapackets received at the destination. However, they do not takeinto consideration the lost packets (which actually have tobe considered as infinity). As a result, long routes are nottaken into account and therefore the results do not reflectreality. Another point is that they compare the results ofOLSR, AODV and DSDV, and such comparison demandsnormalization since its PDR is better than the others.

Chang et al. [29] propose the cooperative bait detectionscheme (CBDS) in order to detect and prevent a gray-holeattack in AODV based routing. By randomly selecting anadjacent node as its destination, a source node is able to baita malicious attackers into sending a reply RREP message;hence, flushing them out. This solution is interesting, but asthe authors themselves write, it increases network overheadwhen under attack.

A heuristic approach, dubbed SNBDS, is proposed byPoongodi and Karthikeyan [30]. The approach suggests modi-fication of the routing table structure for AODV based routing,among them: field status {normal/malicious/suspicious} foreach node, field for the last RREP arrival time for thedestination node that updated its sequence number. Together,these changes create a bait detection technique comparingthe destination sequence number of the received RREP andthat of the previously stored value. A database of suspiciousnodes is composed, and propagated to all nodes using a RREQmessage. Besides the shortcomings mentioned in their paper,it is assumed that all nodes are authenticated, a property whichcontradicts the basic ad-hoc premise of MANETs.

Another similar solution, proposed by Patel and Chawda[31], a threshold composed of three parameters: routing tablesequence number, number of RREQs sent by the node, and thenumber of RREPs received by the node, is computed. Duringroute discovery a RREP message with destination sequencenumber greater than the threshold value is ignored. Attackers,however, might behave correctly during the route discoveryphase and only drop data packets transferred through it -a classical black-hole attack. To detect such behavior, [31]suggested that each node monitor packets transmitted by thenext node down the route chain. A comparison of what ittransmits vs. what the neighbor transmit would flush out amisbehaving black-hole attacker. An ALARM message withthe malicious node identification is then broadcasted to allother participating nodes.

This solution is elegant, but contains some drawbacks.Clearly, it is only effective against a single attacker, but,as the authors note, fails when there are two consecutivecolluding attackers. With the first attacker orchestrating theattack yet relying on the second to drop the packets, a listeningbenign node would have a proper count of outgoing packets.In addition, it deals with detection of attacks and not theirprevention, allowing for an ALARM to sound only after theattack has manifested.

Extended data routing information (EDRI), proposed by[32] and improved by [33], is another technique used for attackdetection. Every node maintains a personal EDRI table whichcontains the history of the packets send to and received fromany neighboring node. A source node compares data entriesof neighboring nodes with those of their neighbors, flaggingmismatches as malicious; information which is then broadcastto the other participants in the network.

VI. CONCLUSIONS AND FUTURE WORKS

This paper presents an improvement algorithm for OLSRbased networks (MANETs, IoT, VANETs, etc.) for mitigat-ing gray-hole (and hence, black-hole) attacks. Using solely

Page 9: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

9

internal knowledge gained by participating nodes, we are ableto decrease captured packets by a double digit factor; wellbeyond what DCFM alone is able to accomplish under similarcircumstances. Our only assumption is an active attacker tryingto maliciously influence network topology to increase theattack surface. Although dormant attackers who can still goundetected can also drop packets, they cannot guarantee thatroutes will pass through them significantly decreasing thepossibility of attack success.

For future planned work, following [1], [18], [19], [20],[21], we hypothesize that pending minor adjustments IMP canwork for VANET environment as well.

VII.

REFERENCES

[1] J. Toutouh, J. Garcia-Nieto, and E. Alba, “Intelligent olsr routingprotocol optimization for vanets,” IEEE Transactions on VehicularTechnology, vol. 61, no. 4, pp. 1884–1894, May 2012.

[2] C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vectorrouting,” in Mobile Computing Systems and Applications, 1999. Pro-ceedings. WMCSA ’99. Second IEEE Workshop on, Feb 1999, pp. 90–100.

[3] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenceddistance-vector routing (dsdv) for mobile computers,” SIGCOMMComput. Commun. Rev., vol. 24, no. 4, pp. 234–244, Oct. 1994.[Online]. Available: http://doi.acm.org/10.1145/190809.190336

[4] T. Clausen, P. Jacquet, C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler,A. Qayyum, and L. Viennot, “Optimized Link State RoutingProtocol (OLSR),” 2003, network Working Group. [Online]. Available:https://hal.inria.fr/inria-00471712

[5] D. Raffo, C. Adjih, T. Clausen, and P. Mühlethaler, “An advancedsignature system for olsr,” in Proceedings of the 2Nd ACM Workshopon Security of Ad Hoc and Sensor Networks, ser. SASN ’04.New York, NY, USA: ACM, 2004, pp. 10–16. [Online]. Available:http://doi.acm.org/10.1145/1029102.1029106

[6] C. Adjih, D. Raffo, and P. Mühlethaler, “Attacks against olsr: Distributedkey management for security,” in 2005 OLSR Interop and Workshop,2005, pp. 28–29.

[7] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wirelessnetworks,” IEEE Journal on Selected Areas in Communications, vol. 24,no. 2, pp. 370–380, Feb 2006.

[8] C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, andD. Raffo, “Securing the olsr protocol,” in Proceedings of Med-Hoc-Net,2003, pp. 25–27.

[9] E. Gerhards-Padilla, N. Aschenbruck, P. Martini, M. Jahnke, and J. Tolle,“Detecting black hole attacks in tactical manets using topology graphs,”in 32nd IEEE Conference on Local Computer Networks (LCN 2007),Oct 2007, pp. 1043–1052.

[10] B. Kannhavong, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour,“Nis01-2: A collusion attack against olsr-based mobile ad hoc networks,”in IEEE Globecom 2006, Nov 2006, pp. 1–5.

[11] W. Yu, Y. Sun, and K. J. R. Liu, “Hadof: defense against routingdisruptions in mobile ad hoc networks,” in Proceedings IEEE 24thAnnual Joint Conference of the IEEE Computer and CommunicationsSocieties., vol. 2, March 2005, pp. 1252–1261 vol. 2.

[12] M. Mohanapriya and I. Krishnamurthi, “Modified {DSR} protocol fordetection and removal of selective black hole attack in {MANET},”Computers & Electrical Engineering, vol. 40, no. 2, pp. 530 – 538,2014. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0045790613001596

[13] R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, “Dos attacks in mobilead hoc networks: A survey,” in 2012 Second International Conferenceon Advanced Computing Communication Technologies, Jan 2012, pp.535–541.

[14] S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. E.Nygard, “Prevention of cooperative black hole attack in wireless ad hocnetworks.” in International conference on wireless networks, vol. 2003,2003.

[15] S. Banerjee, “Detection/removal of cooperative black and gray holeattack in mobile ad-hoc networks,” in proceedings of the world congresson engineering and computer science, 2008, pp. 22–24.

[16] N. Schweitzer, A. Stulman, A. Shabtai, and R. D. Margalit, “Mitigatingdenial of service attacks in olsr protocol using fictitious nodes,” IEEETransactions on Mobile Computing, vol. 15, no. 1, pp. 163–172, Jan2016.

[17] [Online]. Available: https://www.nsnam.org/[18] J. Haerri, F. Filali, and C. Bonnet, “Performance comparison of AODV

and OLSR in VANETs urban environments under realistic mobilitypatterns,” in Med-Hoc-Net 2006, 5th IFIP Mediterranean Ad-HocNetworking Workshop, June 14-17, 2006, Lipari, Italy, Lipari, ITALY,06 2006. [Online]. Available: http://www.eurecom.fr/publication/1952

[19] A. Laouiti, P. Muhlethaler, F. Sayah, and Y. Toor, “Quantitative evalu-ation of the cost of routing protocol olsr in a vehicle ad hoc network(vanet),” in Vehicular Technology Conference, 2008. VTC Spring 2008.IEEE, May 2008, pp. 2986–2990.

[20] T. Chen, O. Mehani, and R. Boreli, “Trusted routing for vanet,”in Intelligent Transport Systems Telecommunications,(ITST),2009 9thInternational Conference on, Oct 2009, pp. 647–652.

[21] J. Santa, M. Tsukada, T. Ernst, O. Mehani, and A. F. Gómez-Skarmeta,“Assessment of VANET multi-hop routing over an experimentalplatform,” International Journal of Internet Protocol Technology, vol. 4,no. 3, Sep. 2009. [Online]. Available: https://hal.inria.fr/inria-00625837

[22] T. Clausen and P. Jacquet, “Rfc 3626: Optimized link state routingprotocol (olsr),” IETF, October, vol. 4, 2003.

[23] D. Raffo, “Security Schemes for the OLSR Protocol for Ad HocNetworks,” Theses, Université Pierre et Marie Curie - Paris VI, Sep.2005, jury: Mme Ana Cavalli, M. François Baccelli, M. FrançoisMorain, M. Paul Mühlethaler, M. Guy Pujolle, M. Ahmed Serhrouchni.[Online]. Available: https://tel.archives-ouvertes.fr/tel-00010678

[24] H. Deng, W. Li, and D. P. Agrawal, “Routing security in wireless adhoc networks,” IEEE Communications Magazine, vol. 40, no. 10, pp.70–75, Oct 2002.

[25] M.-Y. Su, “Prevention of selective black hole attacks on mobile adhoc networks through intrusion detection systems,” Computer Commu-nications, vol. 34, no. 1, pp. 107 – 117, 2011. [Online]. Available:http://www.sciencedirect.com/science/article/pii/S0140366410003774

[26] T. Poongodi and M. Karthikeyan, “Localized secure routing architectureagainst cooperative black hole attack in mobile ad hoc networks,”Wireless Personal Communications, vol. 90, no. 2, pp. 1039–1050,2016. [Online]. Available: http://dx.doi.org/10.1007/s11277-016-3318-5

[27] S. Djahel, F. Nait-Abdesselam, and A. Khokhar, “An acknowledgment-based scheme to defend against cooperative black hole attacks inoptimized link state routing protocol,” in 2008 IEEE InternationalConference on Communications, May 2008, pp. 2780–2785.

[28] M. S. Khan, Q. K. Jadoon, and M. I. Khan, Mobile and WirelessTechnology 2015. Berlin, Heidelberg: Springer Berlin Heidelberg,2015, ch. A Comparative Performance Analysis of MANET RoutingProtocols under Security Attacks, pp. 137–145. [Online]. Available:http://dx.doi.org/10.1007/978-3-662-47669-7_16

[29] J. M. Chang, P. C. Tsou, I. Woungang, H. C. Chao, and C. F. Lai,“Defending against collaborative attacks by malicious nodes in manets:A cooperative bait detection approach,” IEEE Systems Journal, vol. 9,no. 1, pp. 65–75, March 2015.

[30] R. H. Jhaveri and N. M. Patel, “A sequence number based bait detectionscheme to thwart grayhole attack in mobile ad hoc networks,” WirelessNetworks, vol. 21, no. 8, pp. 2781–2798, 2015. [Online]. Available:http://dx.doi.org/10.1007/s11276-015-0945-9

[31] A. D. Patel and K. Chawda, Dual Security Against Grayhole Attackin MANETs. New Delhi: Springer India, 2015, pp. 33–37. [Online].Available: http://dx.doi.org/10.1007/978-81-322-2009-1_4

[32] G. S. Bindra, A. Kapoor, A. Narang, and A. Agrawal, “Detection andremoval of co-operative blackhole and grayhole attacks in manets,”in System Engineering and Technology (ICSET), 2012 InternationalConference on, Sept 2012, pp. 1–5.

[33] A. D. Patel, R. H. Jhaveri, and S. N. Shah, I-EDRI Scheme to MitigateGrayhole Attack in MANETs. New Delhi: Springer India, 2015, pp. 39–43. [Online]. Available: http://dx.doi.org/10.1007/978-81-322-2009-1_5

Page 10: Contradiction Based Gray-Hole Attack Minimization for Ad ......a denial of service (DoS) attack variant called node isolation [4] in OLSR based networks. ... for mitigating the gray-hole

1536-1233 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2016.2622707, IEEETransactions on Mobile Computing

10

Nadav Schweitzer received his bachelor’s degreein Software Engineering from the Jerusalem Collegeof Technology, Jerusalem, Israel, in 2008. Later on(2012) he got his masters in Computer Sciencefrom Bar-Ilan University, Ramat-Gan, Israel. He iscurrently working toward the Ph.D. in the area ofSecurity in Mobile Ad-Hoc Networks at the de-partment of Information Systems Engineering at theBen-Gurion University, Israel.

Ariel Stulman received his bachelor’s degreein Technology and Applied Sciences from theJerusalem College of Technology, Jerusalem, Israel,in 1998. He then went on to get his masters fromBar-Ilan University, Ramat-Gan, Israel, in 2002. In2005 he achieved a Ph.D. from the University ofReims Chanpagne-Ardenne, Reims, France. As of2006 he holds a position at computer department ofthe Jerusalem College of Technology. His researchinterests are in the field of internet security andtechnologies, software testing, formal methods and

real-time systems.Dr. Stulman is a member of the IEEE and ACM, and is the founding director

of the cyber research group at JCT.

Asaf Shabtai is a lecturer at the Dept. of In-formation Systems Eng. at Ben-Gurion University.Asaf is a recognized expert in information systemssecurity and has led several large-scale projects andresearches in this field. His main areas of interestsare computer and network security, machine learn-ing, data mining and temporal reasoning. Asaf haspublished over 30 refereed papers. Asaf holds aB.Sc. in Mathematics and Computer Science (1998);B.Sc. in Information Systems Engineering (1998); aM.Sc. in Information Systems Engineering (2003)

and Ph.D. in Information Systems Engineering (2011) all from Ben-GurionUniversity.

Roy David Margalit received his bachelor’s de-gree in Computer Science with distinction from theJerusalem College of Technology, Jerusalem, Israel,in 2016. Currently a student towards M.Sc. degreein Computer Science at the Hebrew University,Jerusalem, Israel.