CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

An Implementation of Black hole Detection and Prevention Method using AODV Routing Protocol in MANET Environment

by Devendra Kumar, Rupali Bhartiya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 150 - Number 9
Year of Publication: 2016
Authors: Devendra Kumar, Rupali Bhartiya
10.5120/ijca2016911635

Devendra Kumar, Rupali Bhartiya . An Implementation of Black hole Detection and Prevention Method using AODV Routing Protocol in MANET Environment. International Journal of Computer Applications. 150, 9 ( Sep 2016), 40-46. DOI=10.5120/ijca2016911635

@article{ 10.5120/ijca2016911635,
author = { Devendra Kumar, Rupali Bhartiya },
title = { An Implementation of Black hole Detection and Prevention Method using AODV Routing Protocol in MANET Environment },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 150 },
number = { 9 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 40-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume150/number9/26124-2016911635/ },
doi = { 10.5120/ijca2016911635 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:32.942940+05:30
%A Devendra Kumar
%A Rupali Bhartiya
%T An Implementation of Black hole Detection and Prevention Method using AODV Routing Protocol in MANET Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 150
%N 9
%P 40-46
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network security is a pathetic link in wired and wireless network systems. A mobile ad hoc network (MANET) is a compilation of self-sufficient nodes that converse with every further by forming a multi-hop radio network and maintaining associations in a decentralized manner. Security remains a main challenge for these networks owing to their features of open medium, animatedly changing topologies, confidence on accommodating algorithms, absence of federal monitoring points, and lack of clear lines of protection. Mainly of the routing protocols for MANETs are therefore susceptible to dissimilar kind of attacks. Ad hoc on-demand detachment vector routing (AODV) is a much admired routing algorithm. Though, it is susceptible to the recognized black hole attack, where a malevolent node incorrectly advertises good pathway to a purpose node throughout the route discovery process. This attack becomes additional sever while a group of malevolent nodes assist every other. In this paper, a security mechanism is offered against a corresponding attack by multiple black hole nodes in a MANET. The reproduction approved out on the proposed scheme has produced results that establish the efficiency of the mechanism in discovery of the attack as maintaining Constant Network Performance.

References
  1. Priyanka Goyal, Sahil Batra and Ajit Singh, “A Literature Review of Security Attack in Mobile Ad-hoc Networks”, International Journal of Computer Applications, Volume 9– No.12, November 2010
  2. Khushboo Sawant and Dr. M.K Rawat, “Survey of DOS Flooding Attacks over MANET Environment”, International Journal of Engineering Research and Applications, Volume 4, Issue 5, Version 6, PP.110-115, May 2014.
  3. Pradip M. Jawandhiya and Mangesh M. Ghonge, “A Survey of Mobile Ad Hoc Network Attacks”, / International Journal of Engineering Science and Technology, Vol. 2(9), PP. 4063-4071, 2010.
  4. Indrani Das and D. K Lobiyal, “Effect of Mobility Models on the Performance of Multipath Routing Protocol in MANET”, Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP), PP. 149–155, 2014
  5. Vaibhav, “Mobility Models and traffic Pattern Generation Based Optimization of Reactive Protocols”, International Journal Intelligence Engineering Informatics, 2012.
  6. Y. Z.a and W. Lee, "Intrusion Detection in Wireless Ad-Hoc networks," presented at the 6th annual international conference on Mobile computing and networking, PP. 275-283, 2000.
  7. N. Patel, A. Dadhaniya, "Detection of Black Hole Attack in MANET using Intrusion Detection System", International Journal of Advance Engineering and Research Development (IJAERD, Vol 1, Issue 5,May 2014.
  8. H. Deng, W. Li, and D.P. Agrawal, “Routing Security in Wireless Ad Hoc Network”, IEEE Communications Magazines, vol. 40, no. 10, October 2002.
  9. P.N. Raj, P.B. Swadas, “DPRAODV: A Dyanamic Learning System against Black Hole Attack in AODV Based MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, pp 54-59 2009.
  10. N. Mistry, D.C. Jinwala, M. Zaveri, ”Improving AODV Protocol against Black hole Attacks”, in Proc. of the International Multi Conference of Engineer and Computer Science, Vol. 2, 2010.
  11. A.A. Bhosle, T.P. Thosar and S. Mehatre, “Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET”, International Journal of Computer Science, Engineering and Applications (IJCSEA), Vol.2, No.1, February 2012.
  12. S. Bansal and M. Baker, “OCEAN: Observation based cooperation enforcement in ad hoc networks”, Technical Report, Stanford University, 2003
  13. H. Deng, H. Li and D. Agrawal, “Routing Security in Wireless Ad hoc networks”, IEEE Communications Magazine, Volume 40, No. 10, Oct 2002
  14. Juan-Carlos Ruiz, JesúsFriginal, David de-Andrés, Pedro Gil, “Black Hole Attack Injection in Ad hoc Networks”.
  15. Fan-Hsun Tseng1, and Han-Chieh Chao, “A survey of black hole attacks in wireless mobile ad hoc networks”, Tseng et al. Human-centric Computing and Information Sciences 2011
  16. Neetika Bhardwaj, Rajdeep Singh, “Detection and Avoidance of Black-hole Attack in AOMDV Protocol in MANETs”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), PP. 376 – 383, Volume 3, Issue 5, May 2014.
  17. Quansheng Guan, F. Richard Yu, Shengming Jiang and Victor C.M. Leung, “A Joint Design for Topology and Security in MANETs with Cooperative Communications”, 978-1-61284-231-8/11/$26.00 ©2011 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

AODV Black-hole NS2 MANET Routing Protocol