CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Avoidance of Black Hole Attack in Virtual Infrastructure for MANET

by R.kesavan, V. Thulasi Bai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 3
Year of Publication: 2012
Authors: R.kesavan, V. Thulasi Bai
10.5120/7753-0811

R.kesavan, V. Thulasi Bai . Avoidance of Black Hole Attack in Virtual Infrastructure for MANET. International Journal of Computer Applications. 50, 3 ( July 2012), 26-31. DOI=10.5120/7753-0811

@article{ 10.5120/7753-0811,
author = { R.kesavan, V. Thulasi Bai },
title = { Avoidance of Black Hole Attack in Virtual Infrastructure for MANET },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 3 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number3/7753-0811/ },
doi = { 10.5120/7753-0811 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:47:23.370190+05:30
%A R.kesavan
%A V. Thulasi Bai
%T Avoidance of Black Hole Attack in Virtual Infrastructure for MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 3
%P 26-31
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. In this paper, we give an algorithmic approach to focus on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is on ensuring the security against Black hole attack. The proposed solution is capable of detecting Black hole node(s) in the MANET at the beginning and a solution to discover a safe route detects cooperative black hole attack.

References
  1. C. Perkins, E. Belding-Royer, and S. Das,(2003) "Ad-hoc on-demand distance vector (AODV) routing", Internet Draft, RFC 3561, July.
  2. H. Deng, H. Li, and D. Agarval,(2002) "Routing security in wireless ad hoc networks", IEEE Communications Magazine, Vol. 40, No. 10.
  3. L. Tamilselvan, and V. Sankaranarayanan, (2008) "Prevention of cooperative black hole attack in manet", Journal of Networks, Vol. 3 (5),pp. 13-20.
  4. Z. Karakehayov,(2005) "Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks," Wksp. Real-WorldWireless Sensor Networks, June 20–21.
  5. S. Desilva, and R. V. Boppana,(2005) "Mitigating Malicious Control Packet Floods in Ad Hoc Networks," Proc. IEEE Wireless Commun. and Networking Conf. , New Orleans, LA.
  6. Yih-Chun, Adrian Perrig, David B. Johnson,(2002) "Ariadne: A secure On-Demand Routing Protocol for AdHocNetworks",parrow. ece. cmu. edu/~adrian/projects /secure routing/ariadne. pdf.
  7. Junhai luo; Mingyu Fan,(2008) "Research on trust model based on game theory in mobile ad-hoc networks, Journal of Computer Research and Development", Vol 45, No. 10, pp1704-1710
  8. Yi-Chun Hu, Adrian Perrig,(2004) "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security and Privacy, 1540-7993/04/$20. 00 © 2004 IEEE.
  9. Satoshi Kurosawa, "Hidehisa Nakayama and Nei Kato et al,(2008) "Detecting black hole attack on AODV based mobile ad hoc networks by dynamic learning method, International Journal of Network Security", pp. 338-346
  10. Makki, Shamila, Pissinou, Nikki; Huang, Hui,(2004)," Solution to the black hole problem in mobile ad-hoc network, 5th World Wireless Congress", pp. 508-512
  11. Lidong zhou, Zygmunt J. Haas(1999), "Securing Ad Hoc Networks", IEEE network, special issue on network security, Vol. 13, no. 6.
  12. Sukla Banerjee(2008) "Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks" Proceedings of the World Congress on Engineering and Computer Science San Francisco, USA
  13. S. Bansal and M. Baker,(2003) "OCEAN: Observation based cooperation enforcement in ad hoc networks", Technical Report, Stanford University.
  14. M. A. Shurman, S. M. Yoo, and S. Park,(2004) "Black hole attack in wireless ad hoc networks," in ACM 42nd Southeast Conference (ACMSE?04), pp.
  15. Dokurer, Semih. (2006) "Simulation of Black hole attack in wireless Ad-hoc networks". Master's thesis, At?l?mUniversity.
  16. N. H. Mistry, D. C. Jinwala and M. A. Zaveri,(2009) "MOSAODV: Solution to Secure AODV against Blackhole Attack ", (IJCNS) International Journal of Computer and Network Security, Vol. 1, No. 3.
  17. Piyush Agrawal, R. K. Ghosh, Sajal K. Das,(2008), Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks In Proceedings of the 2nd international conference onUbiquitous information management and communication, Pages 310-314, Suwon, Korea.
  18. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard,(2003) "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks", www. cs. ndsu. nodak. edu/~nygard/research BlackHoleMANET. pdf .
  19. Bracha Hod,(2005) "Cooperative and Reliable Packet-Forwarding On Top of AODV", www. cs. huji. ac. il/~dolev/pubs/reliable-aodv. pdf.
  20. Chen Hongsong, Ji Zhenzhou and Hu Mingzeng, (2006) "A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition". Asian Journal of Information Technology, 5 (1) : 54-60.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-Hoc network AODV Black Hole Security Routing