CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Detection of Black Hole Attack using Control Packets in AODV Protocol for MANET

by Nidhi Tiwari, Raghav Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 24
Year of Publication: 2015
Authors: Nidhi Tiwari, Raghav Yadav
10.5120/20957-3381

Nidhi Tiwari, Raghav Yadav . Detection of Black Hole Attack using Control Packets in AODV Protocol for MANET. International Journal of Computer Applications. 118, 24 ( May 2015), 23-29. DOI=10.5120/20957-3381

@article{ 10.5120/20957-3381,
author = { Nidhi Tiwari, Raghav Yadav },
title = { Detection of Black Hole Attack using Control Packets in AODV Protocol for MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 24 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number24/20957-3381/ },
doi = { 10.5120/20957-3381 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:36.388973+05:30
%A Nidhi Tiwari
%A Raghav Yadav
%T Detection of Black Hole Attack using Control Packets in AODV Protocol for MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 24
%P 23-29
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network (MANET) is a network of mobile nodes in which there is no infrastructure is defined. Mobile nodes transmit their information through intermediate nodes. Since there is no predefine infrastructure, MANET suffers from many internal or external attacks. Black hole attack is one of the security attacks in MANET. In black hole attack, a malicious node replies with having a shortest path to destination and absorb the send packet by the source node instead of forwarding it to the destination node. An approach is presented for the detection of black hole attack using control packets and prevents the network by informing other nodes in network.

References
  1. Payal N. Raj and Prashant B. Swdesh (2009), DPROADV: A dynamic leaning system against black hole attack in AODV based MANE, International Journal of Computer Science Issues (IJSI), Vol 2 pp. 54-59.
  2. Seryvuth Tan and Keecheon Kim (2013), Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs, IEEE International Conference on High Performance Computing and Communications & IEEE International Conference on Embedded and Ubiquitous Computing. 1027- 1032.
  3. Wang W, Bhargava B, Linderman M (2009) Defending against Collaborative Packet Drop Attacks on MANETs. Paper presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009).
  4. Mistry N, Jinwala DC, IAENG and Zaveri M (2010). Improving AODV Protocol against Black hole Attacks, the International Multi Conference of Engineers and Computer Scientists, Hong Kong 17-19.
  5. B. Sun, Y. Guan, J. Chen and U. W. Pooch (2003). Detecting black-hole attack in mobile ad hoc networks, presented at 5th European Personal Mobile Communications Conference, Apr. 2003, 490-495.
  6. Jiao Wen-Cheng, Peng Jing And Zheng Jain-Ling (2010) "Research and Improvement of AODV Protocol in Ad Hoc Network", Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference, 1-3.
  7. Al-Shurman M, Yoo S-M, Park S (2004). Black Hole Attack in Mobile Ad hoc Networks. The 42nd Annual ACM Southeast Regional Conference (ACM-SE'42), Huntsville, Alabama, 2-3.
  8. Ehsan H. Khan, F. A (2012). Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs by Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference, 1181 – 1187.
  9. Hemanth Narra, Yufei Cheng,Egemen K. Çetinkaya, Justin P. Rohrer and James P. G. Sterbenz (2011), Destination-Sequenced Distance Vector (DSDV) Routing Protocol Implementation in ns3. Information and Telecommunication Technology Center Department of Electrical Engineering and Computer Science The University of Kansas, Lawrence, KS 66045, USA ,439-446.
  10. Jing Xi, Luis Girons Quesada and Yuming Jiang (2007). A Threshold based Hybrid Routing Protocol for MANET. Published in ISWCS 2007, 4th International Symposium Publisher:IEEE, 622 - 626.
  11. Kozma W. and Lazos L. (2009). REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, 16-18.
  12. Mansoor Mohsin and Ravi Prakash (2002). IP Address Assignment in a Mobile Ad Hoc Network, the University of Texas at Dallas Richardson, TX, MILCOM CCR-0093411.
  13. Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar and Bhavin I. Shah (2010). MANET Routing Protocols and Wormhole Attack against AODV: IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No. 4, April 2010.
  14. Radhika Saini and Manju Khari (2011). Defining Malicious Behavior of a Node and its Defensive Techniques in Adhoc Networks, Journal of Smart Sensors and Adhoc Networks (IJSSAN) Volume 1, Issue-1 18-21.
  15. Subash Chandra Mandhata and Dr. Surya Narayan (2011). A counter measure to Black hole attack on AODV- based Mobile Ad-Hoc Networks: International Journal of Computer & Communication Technology (IJCCT), Volume-2, Issue-VI, 37-42.
  16. S. Marti, T. J. Giuli, K. Lai, and M. Baker (2000). Mitigating routing misbehavior in mobile adhoc networks, in proceedings of the 6th Annual International Conference on Mobile Computing and Networking, 255-265.
  17. Surendra H. Rout and Hemant P. Ambulgekar (2013). Proactive and Reactive protocol, in multihope. Inernational Journal of Advance Research in Computer Science and Software Engineering, 152-157.
  18. Sheikh R. Singh Chande and M. Mishra, D. K (2010) Security issues in MANET. Wireless and Optical Communications Networks (WOCN), 1-4.
  19. Su M-Y (2011). Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems. IEEE Computer Communications 34(1):107-117.
  20. Tamilselvan L, Sankaranarayanan V (2007). Prevention of Blackhole Attack in MANET, the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27-30.
Index Terms

Computer Science
Information Sciences

Keywords

MANET black hole AODV RREQ DRREQ DRREP DBAODV