CFP last date
20 May 2024
Reseach Article

A Survey of Black hole and Worm hole Attack on Routing Protocol AODV in MANET

Published on September 2012 by Sanket P. Gulhane, Ram Kumar Solanki, Nitesh A. Timande
National Conference "MEDHA 2012"
Foundation of Computer Science USA
MEDHA - Number 1
September 2012
Authors: Sanket P. Gulhane, Ram Kumar Solanki, Nitesh A. Timande
15e9bbec-1187-4db3-85d3-e664ef6fe8e6

Sanket P. Gulhane, Ram Kumar Solanki, Nitesh A. Timande . A Survey of Black hole and Worm hole Attack on Routing Protocol AODV in MANET. National Conference "MEDHA 2012". MEDHA, 1 (September 2012), 23-25.

@article{
author = { Sanket P. Gulhane, Ram Kumar Solanki, Nitesh A. Timande },
title = { A Survey of Black hole and Worm hole Attack on Routing Protocol AODV in MANET },
journal = { National Conference "MEDHA 2012" },
issue_date = { September 2012 },
volume = { MEDHA },
number = { 1 },
month = { September },
year = { 2012 },
issn = 0975-8887,
pages = { 23-25 },
numpages = 3,
url = { /proceedings/medha/number1/8673-1012/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference "MEDHA 2012"
%A Sanket P. Gulhane
%A Ram Kumar Solanki
%A Nitesh A. Timande
%T A Survey of Black hole and Worm hole Attack on Routing Protocol AODV in MANET
%J National Conference "MEDHA 2012"
%@ 0975-8887
%V MEDHA
%N 1
%P 23-25
%D 2012
%I International Journal of Computer Applications
Abstract

Ad hoc On-demand Distance Vector routing (AODV) is a widely adopted network routing protocol for Mobile Ad hoc Network (MANET). An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. The design of AODV, however, paid little attention to security considerations, hence resulting in the vulnerability of such MANET to the black hole attack and Wormhole attacks. In this paper, we have study the performance of Mobile Ad-hoc Networks (MANET) under black hole and wormhole attack.

References
  1. Weerasinghe, H. and Huirong Fu. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. In: Future generation communication and networking (fgcn 2007). Jeju: 2007. 362~367.
  2. R. H. Khokhar, Md. A. Ngadi, S. Manda. "A Review of Current Routing Attacks in Mobile Ad Hoc Networks", International Journal of Computer Science and Security, 2 (3), pp. 18-29, 2008.
  3. BounpadithKannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, Abbas Jamalipour. "A Survey of Routing Attacks in Mobile Ad Hoc Networks", IEEE Wireless Communication, 14 (5), pp. 85-91, 2007.
  4. Yih-Chun Hu, Adrian Perrig, David B. Johnson. "Packet leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks". In 22nd Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM) , 3, pp. 1976-1986, 2003.
  5. R. H. Khokhar, Md. A. Ngadi, S. Manda. "A Review of Current Routing Attacks in Mobile Ad Hoc Networks", International Journal of Computer Science and Security, 2 (3), pp. 18-29, 2008.
  6. Hongmei Deng, Wei Li, and Dharma P. Agarwal, "Routing Security in Wireless Ad Hoc Networks", University of Cincinnati, IEEE Communications magazine, October 2002.
  7. Lidongzhou, Zygmunt J. Haas, "Securing Ad Hoc Networks", IEEE network, special issue, November/December 1999.
  8. C. E. Perkins, S. R. Das, and E. Royer, "Ad-hoc Demand Distance vector (AODV)", Mobile Ad Hoc Networking Working Group, IETF Internet Draft, http:/www. ietf. org/internet-draft/draft-ietf-manetaodv- 05. txt March 2000.
  9. P. Ning and K. Sum, "How to misuse AODV: A case study of insider attack against mobile ad hoc routing protocol", Tech Rep, TR- 2003-07, CS Department, NC University, April 2003.
  10. KamanshisBiswas, Md. Liakat Ali. "Security Threats in Mobile Ad Hoc Network". Thesis Paper submitted to the Department of Interaction and System Design, School of Engineering at Blekinge Institute of Technology, Thesis no: MCS-2007:07, 2007.
  11. V. Mahajan, M. Natu, A. Sethi. "Analysis of wormhole intrusion attacks in MANETS". In IEEE Military Communications Conference (MILCOM), pp. 1-7, 2008.
  12. F. Nait-Abdesselam, B. Bensaou, T. Taleb. "Detecting and Avoiding Wormhole Attacks in Wireless Ad hoc Networks", IEEE Communications Magazine, 46 (4), pp. 127 - 133, 2008.
  13. H. S. Chiu and K. Lui. "DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks". In Proceedings of International Symposium on Wireless Pervasive Computing, pp. 6-11, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Aodv Rreq Rrep Blackhole Wormhole