Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Identifying, Avoidance and Performance Assessment of Black Hole Attack on AODV Protocol in MANET

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 95 - Number 17
Year of Publication: 2014
Authors:
Sonika Malik
Indu Kashyap
10.5120/16684-6800

Sonika Malik and Indu Kashyap. Article: Identifying, Avoidance and Performance Assessment of Black Hole Attack on AODV Protocol in MANET. International Journal of Computer Applications 95(17):6-11, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Sonika Malik and Indu Kashyap},
	title = {Article: Identifying, Avoidance and Performance Assessment of Black Hole Attack on AODV Protocol in MANET},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {95},
	number = {17},
	pages = {6-11},
	month = {June},
	note = {Full text available}
}

Abstract

Composition of mobile devices communicating with each other deprived of any infrastructure is a Mobile Adhoc Network (MANET). A mobile node in MANET has dynamic topology and they may move expeditiously that means stability is very less. The intruders take advantage of such individualities of MANET to carry out different varieties of attacks. Out of all these attacks, black hole attack is the most severe one. The routing protocol used by a malicious node is to proclaim itself as having the shortest route to the target node. Black hole node discards all the packets that finally go through it. In this paper, we simulated the Black Hole Attack on AODV protocol using NS-2. 34 simulator and compare the parameters like Packet Delivery Fraction, Network Overhead and Average throughput and also proposed a solution to prevent and figure out this black hole attack on AODV protocol.

References

  • Ankur Mishra, J. Ranjeet, Sharma S. ," A Novel Approack for Detecting and Eliminating Cooperative Black Hole Attack using Advanced DRI Table in Ad hoc Network",3rd IEEE International Advanced Computing Conference (IACC), 2013.
  • Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks", 2003 International Conference on Wireless Networks (ICWN'03), Las Vegas, Nevada, USA
  • Al-Shurman Mohammad and Yoo Seong-Moo," Black Hole Attack in Mobile Ad Hoc Networks", Huntsville, AL, USA. April 2-3, 2004.
  • P. V. Jani, "Security within Ad-Hoc Networks," Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
  • V. Mahajan, M. Natue and A. Sethi, " Analysis of Wormhole Intrusion attacks in MANETs," IEEE Military Communications Conference, pp. 1-7, Nov, 2008.
  • K. Biswas and Md. Liaqat Ali, "Security threats in Mobile Ad-Hoc Network", Master Thesis, Blekinge Institute of Technology" Sweden, 22nd March 2007
  • S. Lu, L. Li, K. Y. Lam, L. Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. ," International Conference on Computational Intelligence and Security, 2009.
  • Deng Hongmei, Li Wei and P. Agarwal Dharma ,"Routing Security in Wireless Ad Hoc Networks", University of Cincinnati, IEEE, October 2009
  • P. Yietaal. , " A Routing Attack in Mobile AdHoc Networks", Int'l. J. Info. Tech. , vol. 11, no. 2, 2005.
  • Junhai Luo, Mingyu Fan, and Danxia Ye," Black Hole Attack Prevention Based on Authentication Mechanism", University of Electronic Science and Technology of China, Chengdu, China, 610054, IEEE, 2008
  • Kozma W, Lazos L "REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits", Second ACM Conference, Zurich, Switzerland, 16-March 2009
  • Su M-Y,"Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems", IEEE Computer Communications:107–117, August 2010
  • Djenouri D, Badache N, "Struggling Against Selfishness and Black Hole Attacks in MANETs", Wireless Communications & Mobile Computing Vol. 8, Issue 6, pp 689-704, August 2008.
  • H. Weerasinge and H. Fu(2008) "Preventing Black Hole Attack in Mobile Ad hoc Networks: simulation, implimentation and evaluation"international journal of software engg. and its applications,vol2,no3