Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Black Hole Attack in AODV Routing Protocol using Security Algorithm in MANET

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Gaurav Rathore, Ratnesh Dubey, Vineet Richhariya
10.5120/ijca2016907779

Gaurav Rathore, Ratnesh Dubey and Vineet Richhariya. Article: Black Hole Attack in AODV Routing Protocol using Security Algorithm in MANET. International Journal of Computer Applications 133(3):25-30, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Gaurav Rathore and Ratnesh Dubey and Vineet Richhariya},
	title = {Article: Black Hole Attack in AODV Routing Protocol using Security Algorithm in MANET},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {3},
	pages = {25-30},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Security is the major concern in mobile ad hoc network (MANETs) due to its dynamic behavior. Mobile ad hoc network is the collection of nodes and it is infrastructure fewer networks which means a node can join or leave in network simultaneously. Because of vibrant topology it is more susceptible to different kind of security attack such as Denial of service (DoS), wormhole, replay, masquerade, black hole etc. Such network uses routing protocol to transmit the packet from one end to another and each node behaves as host or router which can select suitable path for transmission of packet. In this, we determine the black hole attack in AODV routing protocol. Black hole is a network attack in which the malicious node advertises itself that it has freshest route to deliver the packet and then discard or drop it. This paper propose black hole attack detection using security algorithm and the simulation of this is perform on NS-2.34 network simulator.

References

  1. X. Wu and D. K. Y. Yau, “Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach”, In Proc. 3rd International Conference on Security and Privacy in Communications Networks, Nice, France, September 2007.
  2. Lalita Prajapati1, Anurag Singh Tomar “Detection of Black Hole Attack With Improved AODV Protocol in MANET”, International Journal of Innovative Research in Science, Engineering and Technology Vol. 4, Issue 5, May 2015, ISSN(Online): 2319 – 8753.
  3. S.Karthika, N.Vanitha, “Secure Routing Protocol in Delay Tolerant Networks Using Fuzzy Logic Algorithm”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 4, Issue 5, May 2015, ISSN (Print) : 2320 – 3765.
  4. RamanpreetKaur and AnantdeepKaur “BLACKHOLE DETECTION IN MANETS USING ARTIFICIAL NEURAL NETWORKS”, International Journal For Technological Research In Engineering Volume 1, Issue 9, May-2014 ISSN (Online): 2347 – 4718.
  5. WatcharaSaetang and SakunaCharoenpanyasak, “CAODV Free Black hole Attack in Ad Hoc Networks”, 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012).
  6. Sonal, KiranNarang “Black Hole Attack Detection using Fuzzy Logic” 2013 International Journal Of Science and Research (IJSR), ISSN: 2319-7064.
  7. Subash Chandra Mandhata, Dr. Surya Narayan Patro, “A Counter Measure to Black hole Attack on AODV Based Mobile Ad hoc Networks”, International Journal of Computer & Communication Technology(IJCCT), Vol.2, Issue 6, 2011.
  8. Adnan Nadeem and Michael P. Howarth, “A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks”, IEEE Communication Surveys & Tutorials, accepted for publication, 2013.
  9. Harsh Pratap Singh, Rashmi Singh, “A mechanism for discovery and prevention of cooperative black hole attack in mobile ad hoc network using AODV protocol”, International Conference on Electronics and Communication Systems (ICECS) 2014 , Page(s):1 - 8 Print, ISBN:978-1-4799-2321-2.
  10. NeelamKhemariya, Ajay Khuntetha, “An Efficient Algorithm for Detection of Black hole Attack in AODV based MANETs”, International Journal of Computer Applications (0975 – 8887) Volume 66– No.18, March 2013.
  11. K. Lakshmi, S.ManjuPriya, A. JeevarathinamK.Rama, K.Thilagam, “Modified AODV Protocol against Black hole Attacks in MANET“, International Journal of Engineering and Technology.
  12. http://www.isi.edu/nsam/ns. available at: The Network Simulator - ns-2
  13. W. Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall, 2005, PP. 58-309.

Keywords

AODV, MANET,Black hole attack, Security threats, dynamic, Network Simulator