CFP last date
20 May 2024
Reseach Article

Analysis and Implementation of AODV Routing Protocol against Black Hole Attack in MANET

by Sushil Kumar, Deepak Singh Rana, Sushil Chandra Dimri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 1
Year of Publication: 2015
Authors: Sushil Kumar, Deepak Singh Rana, Sushil Chandra Dimri
10.5120/ijca2015905301

Sushil Kumar, Deepak Singh Rana, Sushil Chandra Dimri . Analysis and Implementation of AODV Routing Protocol against Black Hole Attack in MANET. International Journal of Computer Applications. 124, 1 ( August 2015), 12-16. DOI=10.5120/ijca2015905301

@article{ 10.5120/ijca2015905301,
author = { Sushil Kumar, Deepak Singh Rana, Sushil Chandra Dimri },
title = { Analysis and Implementation of AODV Routing Protocol against Black Hole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 1 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number1/22067-2015905301/ },
doi = { 10.5120/ijca2015905301 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:14.379931+05:30
%A Sushil Kumar
%A Deepak Singh Rana
%A Sushil Chandra Dimri
%T Analysis and Implementation of AODV Routing Protocol against Black Hole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 1
%P 12-16
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless mobile ad hoc network (MANET) is a self-configuring network which is composed of several movable mobile nodes. Black Hole attack is one of the DOS attacks in MANET, which can misbehave with network, increase in network traffic, packet loss, decreases throughput, send false reply to the nodes and dropped data packets. Therefore, to analysis all these effects, a contribution has been made with modification of AODV routing protocol as a bhAODV (Black Hole AODV). To show the effect of black hole attack in AODV, result analysis is done using the comparison of AODV and bhAODV. In this paper we also contribute in AODV to provide a solution for Black Hole attack (sbhAODV). Network Simulator (NS 2.35) is used to implement bhAODV and sbhAODV, simulation and result analysis.

References
  1. Burbank JL, Chimento PF, Haberman BK, Kasch WT “Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology”. IEEE Communication Magazine 44(11):39–45, 2009.
  2. Abolhasan, M., Wysocki, T., Dutkiewicz, E: “A review of routing protocols for mobile ad hoc networks”. Elsevier, Amsterdam, 2004
  3. Mahmood, R.A., Khan, A.I.: “A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks”. In: International Symposium on High Capacity Optical Networks and Enabling Technologies”, 2007.
  4. K.A. Jalil, Z. Ahmad, and J.-L. Ab Manan “An Enhanced Route Discovery Mechanism for AODV Routing Protocol” J.M. Zain et al. (Eds.): Springer-Verlag Berlin Heidelberg, ICSECS 2011, Part III, CCIS 181, pp. 408–418, 2011.
  5. Shurman, M.A., Yoo, S.M., S. Park.: “Black hole attack in wireless ad hoc networks”. In: ACM 42nd Southeast Conference ACMSE 2004.
  6. Yang Su Ming, "Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems," Elsevier Computer Communications, vol 34, pp. 107-117, 2011.
  7. Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad hoc Routing for Wireless Networks.In: Proc. 2nd ACM Symp. Mobile Ad hoc Networking and Computing (Mobihoc 2001), Long Beach, CA, pp. 299–302, October 2001.
  8. . Mistry, N.H., Jinwala, D.C., Zaveri, M.A.: “MOSAODV: Solution to Secure AODV against Blackhole Attack”, International Journal of Computer and Network Security, December 2009.
  9. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”. International Journal of Network Security 5(3), 338–346, 2007.
  10. Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K: “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”. Paper presented at the International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003.
  11. Sankaranarayanan, V., Tamilselvan, L: “Prevention of Blackhole Attack in MANET”. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications. IEEE, Los Alamitos, 2007.
  12. Tseng Chin-Yang, Balasubramanyam Poornima, and Ko Calvin, "A Specification-based Intrusion Detection System for AODV" in Proceedings of 1st ACM workshop on security of Ad Hoc and sensor networks, California, Davis, pp. 125-134, 2003.
  13. Sitapara Nishant and Sandeep B. Vanjale, "Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks," in International Conference on Emerging trends in engineering "ICETE-201O" , Jasingpur, 2010.
  14. Himral Lalit, Vig Vishal, and Chand Nagesh, "Preventing AODV Routing Protocol from Black Hole Attack", International Journal of Engineering Science and Technology (IJEST), vol. 3, pp. 3927-3932, 2011.
  15. Von Mulert Jan, Welch n Ian, and Winston K.G.Seah, "Security threats and solutions in MANETs: A case study using AODV and SAODV," Journal of Network and Computer Applications, vol. 35, pp. 1249–1259, 2012.
  16. Khare Shashank, Sharma Manish, Dixit Namrata, and Agrawal Sumit, "Security in Routing Protocol to Avoid Threat of Black Hole Attack in MANET," VSRD International journal of Electrical, Electronics and Communication Engineering, vol. 2 (6), pp. 385-390, 2012.
  17. Ghonge Mangesh and S. U. Nimbhorkar, "Simulation of AODV under Blackhole Attack in MANT," International Journal of Advanced Research in Computer Science and Software Engineering", 2012.
  18. Nabarun Chatterjee and Jyotsna Kumar Mandal, "Detection of Blackhole Behavior using Triangular Encryption in NS2," 1st International Conference on Computational Intelligence: Modeling Techniques and Applications(CIMTA- 2013), pp. 524-529, 2013.
  19. Sharma Ajay, Babu, Ahirwar Rajesh, and Patil Smita, "Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), pp. 79-82, 2012.
  20. Su Mon Bo, Xiao Hannan, Adereti Aderemi, and James A, "A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack," in Third International Symposium on Information Assurance and Security, pp. 50-55, 2007.
  21. The VINT Project, “The NS manual”, A Collaboration between researches at UC Berkeley, LBL, USC/ISI, and Xerox PARC, March 14, 2008.
  22. Eitan Altman and Tania Jimenez, “NS Simulator for beginners”, lecture notes, Univ. of de Los Andes, 2003-2004.
  23. Sushil Kumar Chamoli, Santosh Kumar, Deepak Singh Rana , “Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks”, Paper published by International Journal of Computer Technology & Applications, Vol 3 (4), 1395-1399, ISSN:2229-6093, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV bhAODV sbhAODV CBR Black Hole attack malicious node PDR NS-2.