CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Identifying, Avoidance and Performance Assessment of Black Hole Attack on AODV Protocol in MANET

by Sonika Malik, Indu Kashyap
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 17
Year of Publication: 2014
Authors: Sonika Malik, Indu Kashyap
10.5120/16684-6800

Sonika Malik, Indu Kashyap . Identifying, Avoidance and Performance Assessment of Black Hole Attack on AODV Protocol in MANET. International Journal of Computer Applications. 95, 17 ( June 2014), 6-11. DOI=10.5120/16684-6800

@article{ 10.5120/16684-6800,
author = { Sonika Malik, Indu Kashyap },
title = { Identifying, Avoidance and Performance Assessment of Black Hole Attack on AODV Protocol in MANET },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 17 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number17/16684-6800/ },
doi = { 10.5120/16684-6800 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:40.049778+05:30
%A Sonika Malik
%A Indu Kashyap
%T Identifying, Avoidance and Performance Assessment of Black Hole Attack on AODV Protocol in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 17
%P 6-11
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Composition of mobile devices communicating with each other deprived of any infrastructure is a Mobile Adhoc Network (MANET). A mobile node in MANET has dynamic topology and they may move expeditiously that means stability is very less. The intruders take advantage of such individualities of MANET to carry out different varieties of attacks. Out of all these attacks, black hole attack is the most severe one. The routing protocol used by a malicious node is to proclaim itself as having the shortest route to the target node. Black hole node discards all the packets that finally go through it. In this paper, we simulated the Black Hole Attack on AODV protocol using NS-2. 34 simulator and compare the parameters like Packet Delivery Fraction, Network Overhead and Average throughput and also proposed a solution to prevent and figure out this black hole attack on AODV protocol.

References
  1. Ankur Mishra, J. Ranjeet, Sharma S. ," A Novel Approack for Detecting and Eliminating Cooperative Black Hole Attack using Advanced DRI Table in Ad hoc Network",3rd IEEE International Advanced Computing Conference (IACC), 2013.
  2. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks", 2003 International Conference on Wireless Networks (ICWN'03), Las Vegas, Nevada, USA
  3. Al-Shurman Mohammad and Yoo Seong-Moo," Black Hole Attack in Mobile Ad Hoc Networks", Huntsville, AL, USA. April 2-3, 2004.
  4. P. V. Jani, "Security within Ad-Hoc Networks," Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
  5. V. Mahajan, M. Natue and A. Sethi, " Analysis of Wormhole Intrusion attacks in MANETs," IEEE Military Communications Conference, pp. 1-7, Nov, 2008.
  6. K. Biswas and Md. Liaqat Ali, "Security threats in Mobile Ad-Hoc Network", Master Thesis, Blekinge Institute of Technology" Sweden, 22nd March 2007
  7. S. Lu, L. Li, K. Y. Lam, L. Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. ," International Conference on Computational Intelligence and Security, 2009.
  8. Deng Hongmei, Li Wei and P. Agarwal Dharma ,"Routing Security in Wireless Ad Hoc Networks", University of Cincinnati, IEEE, October 2009
  9. P. Yietaal. , " A Routing Attack in Mobile AdHoc Networks", Int'l. J. Info. Tech. , vol. 11, no. 2, 2005.
  10. Junhai Luo, Mingyu Fan, and Danxia Ye," Black Hole Attack Prevention Based on Authentication Mechanism", University of Electronic Science and Technology of China, Chengdu, China, 610054, IEEE, 2008
  11. Kozma W, Lazos L "REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits", Second ACM Conference, Zurich, Switzerland, 16-March 2009
  12. Su M-Y,"Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems", IEEE Computer Communications:107–117, August 2010
  13. Djenouri D, Badache N, "Struggling Against Selfishness and Black Hole Attacks in MANETs", Wireless Communications & Mobile Computing Vol. 8, Issue 6, pp 689-704, August 2008.
  14. H. Weerasinge and H. Fu(2008) "Preventing Black Hole Attack in Mobile Ad hoc Networks: simulation, implimentation and evaluation"international journal of software engg. and its applications,vol2,no3
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV Black Hole Attack Security NS-2. 34