CFP last date
20 May 2024
Reseach Article

Broadcast ID based Detection and Correction of Black Hole in MANETs

by Pooja Vij, V. K. Banga, Tanu Preet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 17
Year of Publication: 2012
Authors: Pooja Vij, V. K. Banga, Tanu Preet Singh
10.5120/8981-2814

Pooja Vij, V. K. Banga, Tanu Preet Singh . Broadcast ID based Detection and Correction of Black Hole in MANETs. International Journal of Computer Applications. 56, 17 ( October 2012), 6-11. DOI=10.5120/8981-2814

@article{ 10.5120/8981-2814,
author = { Pooja Vij, V. K. Banga, Tanu Preet Singh },
title = { Broadcast ID based Detection and Correction of Black Hole in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 17 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number17/8981-2814/ },
doi = { 10.5120/8981-2814 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:59:04.877625+05:30
%A Pooja Vij
%A V. K. Banga
%A Tanu Preet Singh
%T Broadcast ID based Detection and Correction of Black Hole in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 17
%P 6-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless Adhoc network is a collection of mobile nodes with no pre-established infrastructure, forming a temporary network. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc On-Demand Distance Vector) protocol. The security of the AODV protocol is compromised by a particular type of attack called 'Black Hole' attack [1]. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. It is proposed to wait and check the replies from all the neighboring nodes to find the Black hole nodes. In this research paper, we have detect the black hole node or unauthorized node on the based of broadcast ID. Firstly, to determine and propose routing algorithm for detection and correction of black hole in AODV. Secondly to implement this along on NS2 and analyze the result. Thirdly to obtain the comparison of the following parameters like End to End delay, Routing overheads and Packet delivery with the already proposed protocols. By doing this our proposed algorithm shows better performance than the conventional AODV.

References
  1. V. Karpijoki, "Security in Ad Hoc Networks", Seminar on Network Security
  2. Hongmei Deng, Wei Li, and Dharma P. Agarwal, "Routing Security in Wireless Ad Hoc Networks", University of Cincinnati, IEEE Communications magazine, October 2002.
  3. Lidong Zhou, Zygmunt J. Haas, "Securing Ad Hoc Networks", IEEE network, special issue,, November/December 1999.
  4. C. E. Perkins, S. R. Das, and E. Royer, "Ad-Hoc on Demand Distance Vector (AODV)", March 2000, http://www. ietf. org/internet-drafts/draft-ietf-manet-aodv-05. txt
  5. Charles E. Perkins, Elizabeth M. Belding-Royer, Samir R. Das, Mobile Ad Hoc Networking Working Group, Internet Draft, 17 February 2003.
  6. Yi-Chun Hu, Adrian Perrig, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security and Privacy May/June 2004.
  7. Latha Tamilselvan and Dr. V Sankaranarayanan, "Prevention of Black hole Attack in MANET",The Second international conference on wireless Broadband and Ultra Wideband Communications,2007.
  8. Latha Tamilselvan and Dr. V Sankaranarayanan, "Prevention of Co-operative Black hole attack in MANET", Journal of Networks, Volume No. 5, May 2008.
  9. Govind Sharma and Manish Gupta, "Black Hole Detection in MANET Using AODV Routing Protocol "International Journal of Soft Computing and Engineering, ISSN: 2231-2307, Volume-1, Issue -6, January 2012.
  10. Ming-Yang Su, "Prevention of selective black hole attacks on mobile adhoc networks through intrusion detection systems", ELSEVIER, Volume 34, ppt: 107-117, Issue 1, 15 January 2011.
  11. Nikos Komninos and Dimitris vergados, "Detecting unauthorized and compromised nodes in mobile adhoc networks", ELSEVIER, Volume 5, ppt: 289-298, Issue 3, April 2007.
  12. Imran Raza and S. A Hussain, "Identification of malicious nodes in an AODV pure adhoc network through guard nodes" ELSEVIER, Volume 31, ppt: 1796-1802, Issue 9, 8 June 2008.
  13. Jan von Mulert, Ian Welch and Winston K. G. Seah, "Security threats and solutions in MANETs: A case study using AODV and SAODV", Journal of Network and Computer Applications, Volume 35, ppt: 1249-1259, Issue 4, July 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Routing protocol Ad hoc Networks AODV Black Hole Attack Broadcast ID