Book Details

A STUDY OF BLACK HOLE ATTACKS ON AODV PROTOCOL IN MANET

Sri Vasavi College, Erode Self-Finance Wing, 3rd February 2017. National Conference on Computer and Communication, NCCC’17. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

Ad-hoc network is a collection of dynamic nodes it means any node can join the network and leave the network any time.Wireless communication is less secure than wired communication and that’s why it is the vulnerability of mobile ad-hoc network and any threat can easily affect the communication. Many types of attacks are developed today which badly crash the network and make the communication performance degrade. So for avoid these vulnerabilities and make network secure we propose the technique on SECURITY of mobile ad-hoc network. To provide the security of mobile ad-hoc network we generate new techniques for detection of black hole attack. the performance impact of a black hole attack on a mobile ad hoc network and compare it with our modified AODV routing protocol. The simulation work is carried out by OPNET Modeler. To analyze performance of our proposed algorithm we use performance metrics ex. Network throughput, network load, packet send and received, packet dropped and end-to-end delay. we have surveyed and compare the existing solutions to black hole attacks on AODV protocol and their drawbacks.

References

[1] Raja Mahmood, R.A.; Khan, A.I.; , "A survey on detecting black hole attack in AODV-based mobile ad hoc networks," High Capacity Optical Networks and Enabling Technologies, 2007. HONET 2007. International Symposium on , vol., no., pp.1-6, 18-20 Nov. 2007

[2] Hao Yang; Haiyun Luo; Fan Ye; Songwu Lu; Lixia Zhang; , "Security in mobile ad hoc networks: challenges and solutions," Wireless Communications, IEEE , vol.11, no.1, pp. 38- 47, Feb 2004.

[3] N. Bhalaji, A. Shanmugam, “A Trust Based Model to Mitigate Black Hole Attacks in DSR Based MANET”, European Journal of Scientific Research, Vol.50 No.1, pp.6-15, 2011.

[4] H.A. Esmaili, M.R. Khalili Shoja, Hossein gharaee, “Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator”, World of Computer Science and Information Technology Journal (WCSIT), Vol. 1, No. 2, 49-52, 2011.

[5] Al-Shurman, M., Yoo, S. and Park, S, "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional Conference, pp. 96-97, 2004.

[6] Osathanunkul, K.; Ning Zhang; , "A countermeasure to black hole attacks in mobile ad hoc networks," Networking, Sensing and Control (ICNSC), 2011 IEEE International Conference on, vol., no., pp.508-513, 11-13 April 2011.

[7] Sen, J.; Koilakonda, S.; Ukil, A.; , "A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, Intelligent Systems, Modelling and Simulation (ISMS), 2011 Second International Conference on , vol., no., pp.338-343, 25-27 Jan. 2011.

[8] Payal N. Raj1 and Prashant B. Swadas2, “DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009.

[9] Latha Tamilselvan, V. Sankaranarayanan, “Prevention of Co-operative Black Hole Attack in MANET”, Journal of Networks, Vol 3, No 5, 13-20, May 2008

[10] Songbai Lu; Longxuan Li; Kwok-Yan Lam; Lingyan Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack," Computational Intelligence and Security, 2009. CIS '09. International Conference on, vol.2, no., pp.421-425, 11-14 Dec. 2009

[11] Deng H., Li W. and Agrawal, D.P., "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol.40, no.10, pp. 70- 75, October 2002.

[12] Nital Mistry, Devesh C Jinwala, Mukesh Zaveri, “Improving AODV Protocol against Blackhole Attacks”, proceedings of the International Multi Conference of Engineers and Computer Scientists 2010 Vol II, IMECS 2010

Keywords

MANET, AODV, Black Hole, DPRAODV, MAODV, SAODV.

Image
  • Format Volume 5, Issue 1, No 14, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Author M.Jothilakshmi, S.Bharathi
  • Reference IJCS-225
  • Page No 1401-1406

Copyright 2022 SK Research Group of Companies. All Rights Reserved.