CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs

by Neelam Khemariya, Ajay Khuntetha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 18
Year of Publication: 2013
Authors: Neelam Khemariya, Ajay Khuntetha
10.5120/11183-6302

Neelam Khemariya, Ajay Khuntetha . An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs. International Journal of Computer Applications. 66, 18 ( March 2013), 18-24. DOI=10.5120/11183-6302

@article{ 10.5120/11183-6302,
author = { Neelam Khemariya, Ajay Khuntetha },
title = { An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 18 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 18-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number18/11183-6302/ },
doi = { 10.5120/11183-6302 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:22:45.303948+05:30
%A Neelam Khemariya
%A Ajay Khuntetha
%T An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 18
%P 18-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc Networks (MANET) are the extension of the wireless networks. They plays significant role in real life applications such as military applications, home applications etc. these networks are threatened by a lot of security attacks such as Modification, Denial of service attack, Fabrication attack etc. Black hole attack (also called Selfish node attack) is a dangerous active attack on the mobile Ad hoc Networks (MANET). In this research paper an efficient approach for the detection and removal of the Black hole attack in the Mobile Ad Hoc Networks (MANET) is described. The algorithm is implemented on AODV (Ad hoc on demand Distance Vector) Routing protocol. The algorithm can detects both the single Black hole attack and the Cooperative Black hole attack. The beauty of the algorithm described in this paper is that it not only detects the black hole nodes in case when the node is not idle but it can also detect the Black hole nodes in case when a node is idle as well.

References
  1. Sunil Taneja and Ashwani Kush, "A Survey of Routing Protocols in Mobile Ad Hoc Networks", International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010 ISSN: 2010-0248.
  2. "Ad Hoc Wireless networks" By Shivarammurthy, Pearson Education
  3. T. Lin, S. Midkiff, and J. Park,"A framework for wireless ad hoc routing protocols", in WCNC: Wireless Communications and Networking. IEEE Computer Society, 2003, pp. 1162. 1167.
  4. Arun Kumar, lokantha Reddy and Prakash Hiremath, "Performance Comparison of Wireless Mobile Ad-Hoc Network Routing Protocols", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 6, June 2008
  5. K. Lakshmi, S. Manju Priya, A. Jeevarathinam K. Rama, K. Thilagam, "Modified AODV Protocol against Blackhole Attacks in MANET", International Journal of Engineering and Technology.
  6. Hongmei Deng, Wei Li, Dharma, P. Agrawal, "Routing Security in Wireless Ad Hoc Network", IEEE Communications Magzine, vol. 40, no. 10, October 2002.
  7. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks", 2003 International Conference on Wireless Networks (ICWN'03), Las Vegas, Nevada, USA
  8. W. Kozma, and L. Lazos,"REAct: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits," in Proceedings of the Second ACM Conference on Wireless Network Security (WiSec), pp. 103-110, 2009.
  9. Yibeltal Fantahum Alem & Zhao Hheng Xaun, " Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection ", from Tainjin 300222, China 2010, IEEE Vol. 2 (6), 2010.
  10. Lalit Himral, Vishal Vig, Nagesh Chand," Preventing AODV Routing Protocol from Black Hole Attack", International Journal of Engineering Science and Technology (IJEST).
  11. Watchara Saetang, Sakuna Charoenpanyasak ,"CAODV Free Blackhole Attack in Ad Hoc Networks", International Conference on Computer Networks and Communication Systems (CNCS 2012)IPCSIT vol. 35(2012) © (2012) IACSIT Press, Singapore.
  12. Shashank Khare, Manish Sharma, Namrata Dixit and Sumit Agrawal," Security in Routing Protocol to Avoid Threat of Black Hole Attack in MANET ",VSRD-IJEECE, Vol. 2 (6), 2012, 385-390
  13. Firoz Ahmed, Seok Hoon Yoon and Hoon Oh," An Efficient Black Hole Detection Method using an Encrypted Verification Message in Mobile Ad Hoc Networks", International Journal of Security and Its Applications Vol. 6, No. 2, April, 2012 .
  14. Mr. Golok Panda, Mr. Gouri Shankar Mishra, Mr. Ashok Kumar Sahoo, "Prevention of Black hole Attack in AODV protocols for Mobile Ad Hoc Network by Key Authentication", IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol. 2, No. 3, June 2012.
  15. Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre,"Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET", International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 2, No. 1, February 2012 DOI: 10. 5121/ijcsea. 2012. 2105 45.
  16. Sowmya K. S, Rakesh T. and Deepthi P Hudedagaddi, "Detection and Prevention of Blackhole Attack in MANET Using ACO", IJCSNS International Journal of Computer Science and Network Security, VOL. 12 No. 5, May 2012 21
  17. Sarita Choudhary, Kriti Sachdeva,"Discovering a Secure Path in MANET by Avoiding Black Holes", International Journal of Recent Technology and Engineering (IJRTE) SSN: 2277-3878, Volume-1, Issue-3, August 2012.
  18. M. Umaparvathi, Dharmishtan K. Varughese, "Two Tier Secure AODV against Black Hole Attack in MANETs", European Journal of Scientific Research ISSN 1450-216X Vol. 72 No. 3 (2012), pp. 369-382
Index Terms

Computer Science
Information Sciences

Keywords

AODV Black hole Attack Destination Sequence Number Idle node Proactive Reactive Selfish Node Wormhole Attack