Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents

  • Authors:
  • Anoosha Prathapani;Lakshmi Santhanam;Dharma P. Agrawal

  • Affiliations:
  • Department of Electrical and Computer Engineering, University of Cincinnati, Cincinnati, USA;School of Computing Sciences and Informatics, University of Cincinnati, Cincinnati, USA;School of Computing Sciences and Informatics, University of Cincinnati, Cincinnati, USA

  • Venue:
  • The Journal of Supercomputing
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

A Wireless Mesh Network (WMN) is a promising way of providing low-cost broadband Internet access. The underlying routing protocol naively assumes that all the nodes in the network are non-malicious. The open architecture of WMN, multi-hop nature of communication, different management styles, and wireless communication paves way to malicious attackers. The attackers can exploit hidden loopholes in the multipath mesh routing protocol to have a suction attack called the blackhole attack. The attacker can falsify routing metrics such as the shortest transmission time to reach any destination and thereby suck the network traffic.We propose a novel strategy by employing mobile honeypot agents that utilize their topological knowledge and detect such spurious route advertisements. They are deployed as roaming software agents that tour the network and lure attackers by sending route request advertisements. We collect valuable information on attacker's strategy from the intrusion logs gathered at a given honeypot. We finally evaluate the effectiveness of the proposed architecture using simulation in ns-2.