CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure AODV Simulation under Black hole Attack in MANET

by Vidhya Patel, Deepak Chaudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 20
Year of Publication: 2018
Authors: Vidhya Patel, Deepak Chaudhary
10.5120/ijca2018917903

Vidhya Patel, Deepak Chaudhary . Secure AODV Simulation under Black hole Attack in MANET. International Journal of Computer Applications. 181, 20 ( Oct 2018), 19-23. DOI=10.5120/ijca2018917903

@article{ 10.5120/ijca2018917903,
author = { Vidhya Patel, Deepak Chaudhary },
title = { Secure AODV Simulation under Black hole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 181 },
number = { 20 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number20/30001-2018917903/ },
doi = { 10.5120/ijca2018917903 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:29.327833+05:30
%A Vidhya Patel
%A Deepak Chaudhary
%T Secure AODV Simulation under Black hole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 20
%P 19-23
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper dissects the blackhole assault which is one of the conceivable assaults in impromptu systems. In a blackhole assault, a malignant hub mimics a goal hub by sending a ridiculed course answer bundle to a source hub that starts a course revelation. By doing this, the noxious hub can deny the activity from the source hub. In this paper, we mimic the Ad hoc on Demand Vector Routing Protocol (AODV) under blackhole assault by thinking about various execution metric. The recreation results demonstrate the viability of blackhole assault on AODV convention.

References
  1. C. Bettstetter, G. Resta, and P. Santi, “The node distribution of the random waypoint mobility model for wireless ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 3, pp. 257-269, Jul./Sep. 2003.
  2. H. Deng, W. Li, and D. P. Agrawal, “Routing security in ad hoc networks,” IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, Oct. 2002.
  3. Y. C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” in EigConference on Mobile Computing and Networking (Mobi- Com 2002), pp. 12-23, Sept. 2002.
  4. Y. C. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in The 4th IEEE Workshop on Mobile Computing Systems & Applications, pp. 3-13, June 2002.
  5. C. Perkins and P. Bhagwat. “Routing over multihop wireless network for mobile computers”. SIGCOMM ’94 : Computer Communications Review: 234-244, Oct. 1994.
  6. M. A. Shurman, S. M. Yoo, and S. Park, “Black hole attack in wireless ad hoc networks.” In: Proceedings of the ACM 42nd Southeast Conference (ACMSE’04), pp 96-97, Apr. 2004.
  7. Y. A. Huang and W. Lee, “Attack analysis and detection for ad hoc routing protocols,” in The 7th International Symposium on Recent Advances in Intrusion Detection (RAID’04), pp. 125-145, French Riviera, Sept. 2004.
  8. Tamilselvan, L. Sankaranarayanan, V. “Prevention of Blackhole Attack in MANET”, Journal of Networks, Vol.3, No.5, May 2008.
  9. S. Lee, B. Han, and M. Shin, “Robust routing in wireless ad hoc networks,” in ICPP Workshops, pp. 73, 2002.
  10. C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, “Performance comparison of two on-demand routing protocols for ad hoc networks,” IEEE Personal Communications, pp. 16-28, Feb. 2001.
  11. C. E. Perkins, E. M. B. Royer, and S. R. Das, Ad hoc On-Demand Distance Vector (AODV) routing, RFC 3561, July 2003.
  12. Kumar, T. and K. Verma, 2010a. A theory based on conversion of RGB image to gray image. Int. J. Computer. Appli., 7: 5-12. DOI: 10.5120/1140-1493.
  13. K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. B. Royer, “Authenticated routing for ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, pp. 598-610, Mar. 2005.
  14. M. A. Shurman, S. M. Yoo, and S. Park, “Black hole attack in wireless ad hoc networks,” in ACM 42nd Southeast Conference (ACMSE’04), pp. 96-97, Apr. 2004.
  15. W. Wang, Y. Lu, and B. K. Bhargava, “On vulnerability and protection of ad hoc on-demand distance vector protocol,” in The 10th International Conference on Telecommunications (ICT’03), vol. 1, pp. 375-382, French Polynesia, Feb. 2003.
  16. M. G. Zapata, Secure Ad Hoc on-demand Distance Vector (SAODV) Routing, IETF Internet Draft,draft-guerrero-manet-saodv-03, Mar. 2005.
Index Terms

Computer Science
Information Sciences

Keywords

AODV Blackhole attack Security MANET