CFP last date
20 May 2024
Reseach Article

Quantitative Detection of AODV against Black Hole and Worm Hole Attacks in MANET

by Neha Malhotra, Rachit Garg, Rajiv Mahajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 11
Year of Publication: 2013
Authors: Neha Malhotra, Rachit Garg, Rajiv Mahajan
10.5120/11626-7097

Neha Malhotra, Rachit Garg, Rajiv Mahajan . Quantitative Detection of AODV against Black Hole and Worm Hole Attacks in MANET. International Journal of Computer Applications. 68, 11 ( April 2013), 42-48. DOI=10.5120/11626-7097

@article{ 10.5120/11626-7097,
author = { Neha Malhotra, Rachit Garg, Rajiv Mahajan },
title = { Quantitative Detection of AODV against Black Hole and Worm Hole Attacks in MANET },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 11 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 42-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number11/11626-7097/ },
doi = { 10.5120/11626-7097 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:27:35.509228+05:30
%A Neha Malhotra
%A Rachit Garg
%A Rajiv Mahajan
%T Quantitative Detection of AODV against Black Hole and Worm Hole Attacks in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 11
%P 42-48
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is very essential in both wired and wireless network communication. An ad hoc network is a collection of number of wireless computers having dynamically changing topology due to which the security issues are more in case of wireless networks. In this paper the aim is to provide a quantitative analysis of all the security challenges that effect the performance of MANET protocols by analyzing the effects on AODV ( Ad hoc on demand vector routing protocol). The current paper willexplain the concern of black hole, worm holeattacks and presents the impact on AODV routing protocol.

References
  1. Agrawal, D. P. , "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol. 40, no. 10, pp. 70- 75, October 2002.
  2. Bala, A. , Bansal, M. , and Singh, J. 2010. Performance Analysis of MANET under Blackhole Attack. First International Conference on Networks and Communications 141-145.
  3. Bintu Kadhiwala and Harsh Shah, " Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-hoc Networks" International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS - 2012) Proceedings published in International Journal of Computer Applications® (IJCA) (0975 – 8887)
  4. IrshadUllah and Shoaib Ur Rehman, Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols
  5. Kute D. S. , Patil A. S. , Pardakhe N. V. and Kathole A. B. , International Journal of Wireless Communication
  6. Latha Tamilselvan, V. Sankaranarayanan, "Prevention of Co-operative Black Hole Attack in MANET", Journal of Networks, Vol 3, No 5, 13-20, May 2008
  7. Madhusudhananagakumar KS, G. Aghila, "A Survey on Black Hole Attacks on AODV Protocol in MANET"International Journal of Computer Applications (0975 – 8887) Volume 34– No. 7, November 2011
  8. M. , Yoo, S. and Park, S, "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional Conference, pp. 96-97, 2004.
  9. Neha , Tarun Gupta, Rachit Garg," A Quantitative survey of mobile and ad hoc multicast routing protocols" International Journal of Emerging Technology and Advanced Engineering
  10. N. Bhalaji, A. Shanmugam, "A Trust Based Model to Mitigate Black Hole Attacks in DSR Based MANET", European Journal of Scientific Research, Vol. 50 No. 1, pp. 6-15, 2011.
  11. Nidhi Nigam and Vishal Sharma, "A Novel Approach for Wormhole Detection in MANET"International Journal of Computer Applications (0975 – 8887) Volume 63– No. 7, February 2013
  12. Pratik Singh, Aman Dutta, Flood Tolerant AODV Protocol (FT-AODV),International Journal of Computer Applications (0975 – 8887) Volume 53– No. 6, September 2012
  13. Reshmi Maulik1 and Nabendu Chaki2, " A Study on Wormhole Attacks in MANET", International Journal of Computer Information Systems and Industrial Management Applications ISSN 2150-7988 Volume 3 (2011) pp. 271-279
  14. Sharma, N. , and Sharma, A. 2012. The Black-hole node attack in MANET. Second International Conference on Advanced Computing and Communication Technologies 546-550.
  15. Tamilselvan, L. ; Sankaranarayanan, V. , "Prevention of Blackhole Attack in MANET," Wireless Broadband and Ultra Wideband Communications, 2007. Aus Wireless 2007. The 2nd International Conference on, vol. , no. , pp. 21, 27-30 Aug. 2007.
  16. Thind. T. , & Garg. R. , "Mobile distributed system: concepts, issues, challenges", National Conference on Emerging Trends in Computer Science & Engineering (ETCSE-2012) , 11th-12th May,2012, Guru Kashi University, Talwandi Sabo, Punjab, India
  17. XiaoYang Zhang; Sekiya, Y. ; Wakahara, Y. , "Proposal of a method to detect black hole attack in MANET," Autonomous Decentralized Systems, 2009. ISADS '09. International Symposium on, vol. , no. , pp. 1-6, 23-25 March 2009
  18. Y. -C. Hu, A. Perrig, D. B. Johnson. "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks", Wireless Networks, 11(1-2), pp. 21–38, 2005.
  19. NitalMistry, Devesh C Jinwala, Member, IAENG, MukeshZaveri"Improving AODV Protocol against Blackhole Attacks"
Index Terms

Computer Science
Information Sciences

Keywords

Ad hoc network protocol AODV black hole worm hole wireless network packets