BRAVO: A black-hole resilient ad-hoc on demand distance Vector rOuting for tactical communications

Published on May 27, 2014
· DOI :10.1109/BLACKSEACOM.2014.6849023
Ermanno Guardo4
Estimated H-index: 4
(University of Catania),
Giacomo Morabito29
Estimated H-index: 29
(University of Catania)
+ 2 AuthorsFerdinando Battiati1
Estimated H-index: 1
Mobile Ad Hoc Networks (MANET) are widely used in tactical scenarios because they can be deployed rapidly in hostile areas and the distributed nature of their operations makes them robust to nodes failures. However, distributed control involves new vulnerabilities that might be critical in electronic warfare scenarios. In this paper we focus on black hole attacks which introduce in the network fake routing information. On the consequence of the above information, the malicious node enters in the end-to-end path of most communication sessions and discards all received packets. In this paper a solution, named BRAVO is proposed, that exploits a mechanism based on credits allowing nodes to estimate the trustworthiness of neighboring nodes. Simulation results demonstrate that in most scenarios BRAVO is robust to black hole attacks.
  • References (2)
  • Citations (1)
📖 Papers frequently viewed together
8 Citations
42 Citations
3 Authors (Jiejun Kong, ..., Mario Gerla)
56 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
#1Seyed Hossein Hosseini Nazhad Ghazani (IAU: Islamic Azad University)H-Index: 4
#1Seyed Hossein Hosseini Nazhad (IAU: Islamic Azad University)H-Index: 4
Last. Rasim M. Alguliev (ANAS)H-Index: 15
view all 3 authors...
Ad hoc networks are wireless networks without a fixed infrastructure, which are usually assembled on a temporary basis to serve a specific deployment such as emergency rescue or battlefield communication. The differentiating feature of an ad hoc network is that the functionality normally assigned to infrastructure components, such as access points, switches, and routers. For most cases, there is an assumption that the participating nodes are mobile, do not have a guaranteed uptime, and have limi...
3 CitationsSource
#1Mohammad Al-Shurman (UAH: University of Alabama in Huntsville)H-Index: 4
#2Seong-Moo Yoo (UAH: University of Alabama in Huntsville)H-Index: 4
Last. Seungjin Park (MTU: Michigan Technological University)H-Index: 8
view all 3 authors...
The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header. Computer simulation shows that compared to the original ad hoc on-demand distance vector (AODV) routing scheme, the second solution can verify 75% to 98% of the route to the destination depending on the pause times at a ...
354 CitationsSource
Cited By1
#2Girolamo Catania (Leonardo)
Last. Andrea Viola (University of Catania)
view all 6 authors...
The Cyber Security Simulation Service (CSSS) is a platform that provides a simulation environment modeling the impact of cyber attacks and related countermeasure in tactical networks exploiting the software defined networking (SDN) paradigm. CSSS integrates a generator of tactical scenarios, a network simulator, a graphical user interface, and a real SDN controller. The scenario generator, network simulator and user interface interact with each others exploiting a NATO standard called High Level...