CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Improving the Security of AODV Protocol using V-Detector Algorithm

by Alaa Althalji, Souheil Khawatmi, Mohamed Khatib
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 17
Year of Publication: 2019
Authors: Alaa Althalji, Souheil Khawatmi, Mohamed Khatib
10.5120/ijca2019919623

Alaa Althalji, Souheil Khawatmi, Mohamed Khatib . Improving the Security of AODV Protocol using V-Detector Algorithm. International Journal of Computer Applications. 177, 17 ( Nov 2019), 50-57. DOI=10.5120/ijca2019919623

@article{ 10.5120/ijca2019919623,
author = { Alaa Althalji, Souheil Khawatmi, Mohamed Khatib },
title = { Improving the Security of AODV Protocol using V-Detector Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2019 },
volume = { 177 },
number = { 17 },
month = { Nov },
year = { 2019 },
issn = { 0975-8887 },
pages = { 50-57 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number17/30995-2019919623/ },
doi = { 10.5120/ijca2019919623 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:46:12.207395+05:30
%A Alaa Althalji
%A Souheil Khawatmi
%A Mohamed Khatib
%T Improving the Security of AODV Protocol using V-Detector Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 17
%P 50-57
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Routing in Mobile Ad Hoc Networks (MANETs) is very important because they are infrastructure-less, so the routing protocol in these networks works on each node. If routing protocols do not work properly, the network will stop. In these networks, there is no centralized control or server to control the activities of nodes, so they are more vulnerable to many security risks and attacks such as the black hole attack and the gray hole attack. In this paper, the proposed Defensive AODV protocol (DAODV) is used to defend against these attack using the V-Detector algorithm which is an artificial immune system algorithm. The results show that the proposed DAODV provides much better performance than the normal AODV in the presence of malicious nodes in the network.

References
  1. BANG A., 2015. Wireless Ad-Hoc Networks: Types, Applications, Security Goals. International Journal of Advent Research in Computer and Electronics ,128-132.
  2. PERKINS C.E., BELDING-ROYER E.M., and DAS S.R., 2003. Ad Hoc On-Demand Distance Vector Routing. Network Working Group, IETF RFC 3561.
  3. Panday M., Shriwastava A., 2013. A Review on security Issues of AODV routing protocol for MANETs. IOSR Journal of Computer Engineering,14(5), 127-134.
  4. LISS M., 2011. Network Layer Misbehavior in Mobile Ad Hoc Networks. EE4723: Computer and Network Security.
  5. Abdelshafy, M. A., & King, P. J. 2016. Resisting blackhole attacks on MANETs. IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 1048-1053).
  6. Dhende, S., Musale, S., Shirbahadurkar, S., & Najan, A. 2017. SAODV: Black hole and gray hole attack detection protocol in MANETs. In 2017 International Conference on Wireless Communications, Signal Processing and Networking. 2391-2394.
  7. Baghel, L., Mishra, P., Samvatsar, M., & Singh, U. 2017. Detection of black hole attack in mobile ad hoc network using adaptive approach. International conference of Electronics, Communication and Aerospace Technology. 626-630.
  8. Behzad, S., Fotohi, R., Balov, J. H., & Rabipour, M. J. 2018. An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks. Journal of Computers, 13(6), 705-720.
  9. Floreano, D. and Mattiussi, C., 2008. Bio-inspired artificial intelligence: theories, methods, and technologies. MIT press.
  10. Tan, Y., 2016. Anti-Spam Techniques Based on Artificial Immune System. CRC Press.
  11. Ramdane, C. and Chikhi, S., 2017. Negative selection algorithm: recent improvements and its application in intrusion detection system. Int. J. Comput. Acad. Res.(IJCAR), 6(2), pp.20-30.
  12. Dixon, S.E., 2010. Studies on Real-Valued Negative Selection Algorithms for Self-Nonself Discrimination.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc networks AODV black hole attack gray hole attack V-Detector Artificial Immune Systems.