CFP last date
20 May 2024
Reseach Article

AOMDV Routing based Enhanced Security for Black Hole Attack in MANETs

Published on February 2013 by D. Geetha, B. Revathi
International Conference on Research Trends in Computer Technologies 2013
Foundation of Computer Science USA
ICRTCT - Number 2
February 2013
Authors: D. Geetha, B. Revathi
a4b133a2-e2e2-4cc6-ab5e-3eb01b196e0c

D. Geetha, B. Revathi . AOMDV Routing based Enhanced Security for Black Hole Attack in MANETs. International Conference on Research Trends in Computer Technologies 2013. ICRTCT, 2 (February 2013), 20-24.

@article{
author = { D. Geetha, B. Revathi },
title = { AOMDV Routing based Enhanced Security for Black Hole Attack in MANETs },
journal = { International Conference on Research Trends in Computer Technologies 2013 },
issue_date = { February 2013 },
volume = { ICRTCT },
number = { 2 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 20-24 },
numpages = 5,
url = { /proceedings/icrtct/number2/10811-1023/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Research Trends in Computer Technologies 2013
%A D. Geetha
%A B. Revathi
%T AOMDV Routing based Enhanced Security for Black Hole Attack in MANETs
%J International Conference on Research Trends in Computer Technologies 2013
%@ 0975-8887
%V ICRTCT
%N 2
%P 20-24
%D 2013
%I International Journal of Computer Applications
Abstract

A Mobile Ad-hoc Network (MANET) is a dynamic wireless network that can be formulated without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing protocol that adapt to the frequent and randomly changing network topology. Several attacks are possible in the available routing protocols such as Wormhole attack, black hole attack, byzantine attack, etc. Among these attacks black hole attack is of major concern in AODV, is one of the popular routing protocols for MANET. In this study, analyzed the use of AOMDV (Ad-hoc On-demand Multipath Distance Vector) and improved the security of MANET against the black hole attack. The main objective is to provide security against the Black hole attack. Finally compared and evaluated the performance of On-demand routing protocols Ad-hoc On-demand Distance Vector (AODV) routing protocol, which is unipath and Ad-hoc On-demand Multipath Distance Vector (AOMDV) routing protocol. When compared to the existing AODV protocol, AOMDV has better packet delivery ratio and comparatively low average end-to-end delay. The number of packets dropped in the AOMDV against the black hole attack is very low. Thus the proposed technique which uses AOMDV is proved to be better against black hole attacks.

References
  1. S. Ci et al. , "Self-Regulating Network Utilization in Mobile Ad-Hoc Wireless Networks," IEEE Trans. Vehic. Tech. , Vol. 55, No. 4, Pp. 1302–1310, 2006.
  2. K. Biswas and Md. Liaqat Ali, "Security threats in Mobile Ad-Hoc Network", Master Thesis, Blekinge Institute of Technology", Sweden, 2007.
  3. B. Awerbuch, D. Holmer, C. Nita Rotaru and Herbert Rubens. "An On-Demand Secure Routing Protocol Resilient to Byzantine Failures", Proceedings of the ACM Workshop on Wireless Security, Pp. 21-30, 2002.
  4. C. E. Perkins and E. M. Royer. "Ad Hoc On-Demand Distance Vector Routing". Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, Pp. 90-100, 1999.
  5. Elizabeth M. Royer "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks", IEEE Personal Communication, 1999.
  6. B. Wu et al. , "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Wireless/Mobile Network Security, Springer, Vol. 17, 2006.
  7. Sanjay Ramaswamy, Huirong Fu, ManoharSreekantaradhya, John Dixon and Kendall Nygard. "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks". Department of Computer Science, IACC 258 North Dakota State Universities, Fargo, ND 58105.
  8. Dhurandher, S. K. ; Obaidat, M. S. ; Verma, K. ; Gupta, P. ; Dhurandher, P. ; "FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems", IEEE Systems Journal, Vol. 5, No. 2, Pp. 176 – 188, 2011.
  9. Lacharite, Y. ; Dang Quan Nguyen; Maoyu Wang; Lamont, L. ; "A trust-based security architecture for tactical MANETS", IEEE Military Communications Conference (MILCOM), Pp. 1 – 7, 2008.
  10. Raza, I. ; Hussain, S. A. ; "A Trust based Security Framework for Pure AODV Network", International Conference on Information and Emerging Technologies (ICIET), Pp. 1 – 6, 2007.
  11. Bhargava, S. ; Agrawal, D. P. ; "Security enhancements in AODV protocol for wireless ad hoc networks", IEEE VTS 54th Vehicular Technology Conference (VTC), Vol. 4, Pp. 2143 – 2147, 2001.
  12. Songbai Lu; Longxuan Li; Kwok-Yan Lam; LingyanJia; "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack", International Conference on Computational Intelligence and Security (CIS '09), Vol. 2, Pp. 421 – 425, 2009.
  13. Mahajan, V. ; Natu, M. ; Sethi, A. ; "Analysis of wormhole intrusion attacks in MANETS", IEEE Military Communications Conference (MILCOM), Pp. 1 – 7, 2008.
  14. Bala, A. ; Bansal, M. ; Singh, J. ; "Performance Analysis of MANET under Blackhole Attack", First International Conference on Networks and Communications (NETCOM '09), Pp. 141 – 145, 2009.
  15. XiaoYang Zhang; Sekiya, Y. ; Wakahara, Y. ; "Proposal of a method to detect black hole attack in MANET", International Symposium on Autonomous Decentralized Systems (ISADS '09), 1 – 6, 2009.
  16. A. Shevtekar, K. Anantharam, and N. Ansari, "Low Rate TCP Denial-of-Service Attack Detection at Edge Routers," IEEE Commun. Lett. , Vol. 9, No. 4, Pp. 363–65, 2005.
  17. Y-C Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Sec. and Privacy, 2004.
  18. K. Sanzgiri et al. , "A Secure Routing Protocol for Ad Hoc Networks," Proc. 2002 IEEE Int'l. Conf. Network Protocols, 2002.
  19. H. D. Trung, W. Benjapolakul, P. M. Duc, "Performance evaluation and comparison of different ad hoc routing protocols", Department of Electrical Engineering, Chulalongkorn University, Bangkok, Thailand, 2007
Index Terms

Computer Science
Information Sciences

Keywords

Black Hole Gray Hole Warm Hole Attack Manet Active Attack Passive Attack