Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Detection and Prevention from Black Hole Attack in AODV Protocol for MANET

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 5
Year of Publication: 2012
Authors:
Abhilasha Sharma
Rajdeep Singh
Ghanshyam Pandey
10.5120/7764-0837

Abhilasha Sharma, Rajdeep Singh and Ghanshyam Pandey. Article: Detection and Prevention from Black Hole Attack in AODV Protocol for MANET. International Journal of Computer Applications 50(5):1-4, July 2012. Full text available. BibTeX

@article{key:article,
	author = {Abhilasha Sharma and Rajdeep Singh and Ghanshyam Pandey},
	title = {Article: Detection and Prevention from Black Hole Attack in AODV Protocol for MANET},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {5},
	pages = {1-4},
	month = {July},
	note = {Full text available}
}

Abstract

Mobile ad hoc network is dynamic in nature and vulnerable for several attacks to be arising in it. Mobile nodes frequently disconnect and join the network; they can arbitrarily moves from one place to another. There are several attacks in MANET. One of the attacks is Black hole attack, it is a kind of active attack, it drops the entire incoming packet between one source and destination. Black Hole nodes or Black Holes actually send a fake RREP packet and advertise itself as the shortest route is found. Sender starts transmitting packets to Black Hole, But packet do not reach the destination node on account of this attack and data packets are also lost . In our work we tried to secure the AODV protocol, so that it can withstand the attack by adding an IDS_node to AODV protocol. We have seen that packet drop ratio is decreased by desirable amount. This will help to improve the performance of Mobile Ad hoc network and decrease the Packet loss ratio, which increased due to the attack. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the Black Hole attack. In this paper, we simulated the attack in various wireless ad-hoc network scenarios and have tried to find a response system in simulations.

References

  • Mangesh Ghonge and Prof. S. U. Nimbhorkar "Simulation of AODV under Blackhole Attack in MANET" IJARCSSE, Feb 2012.
  • C. Perkins, E. Belding-Royer, and S. Das. AODV RFC3261, experimental edition, July 2003.
  • Tamilselvan, L. Sankaranarayanan, V. "Prevention of Blackhole Attack in MANET", Journal of Networks, Vol. 3, No. 5, May 2008.
  • P. -W. Yau and C. J. Mitchell, "Security Vulnerabilities in Ad hoc Networks," Proceedings of the 7th International Symposium on Communication Theory and Applications (ISCTA), pp. 99–104, 2003.
  • D. Chen, J. Deng, and P. K. Varshney, "Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming (research poster)," Proceedings of the 9th ACM International Conferenceon Mobile Computing and Networking (MobiCom), 2003.
  • C. Silva Ram Murthy and C. Siva Ram. Ad Hoc wireless networks : architectures and protocols. Prentice Hall PTR, 2004.
  • C. E. Perkins, P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," In ACM SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications, pp. 231–241, 1994.
  • Marc Greis, "Tutorial for the Network Simulator (NS2)"
  • M. A. Shurman, S. M. Yoo, and S. Park, "Black hole attack in wireless ad hoc networks. " In: Proceedings of the ACM 42nd Southeast Conference (ACMSE'04), pp 96-97, Apr. 2004.
  • Reena Karandikar, Rashmit Kaur Khanuja, Surendra Shukla "proposed solution to prevent black hole attack in manet" Volume 2, Issue 2 (February 2012) IJRIM.
  • Madhusudhananagakumar KS, G. Aghila "A Survey on Black Hole Attacks on AODV Protocol in MANET" International Journal of Computer Applications (0975 – 8887) Volume 34– No. 7, November 2011.