CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Modified AODV Routing Protocol to Avoid Black Hole Attack in MANETs

by Tarek M. Mahmoud, Abdelmgeid A. Aly, Omar Makram M
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 6
Year of Publication: 2015
Authors: Tarek M. Mahmoud, Abdelmgeid A. Aly, Omar Makram M
10.5120/19195-0809

Tarek M. Mahmoud, Abdelmgeid A. Aly, Omar Makram M . A Modified AODV Routing Protocol to Avoid Black Hole Attack in MANETs. International Journal of Computer Applications. 109, 6 ( January 2015), 27-33. DOI=10.5120/19195-0809

@article{ 10.5120/19195-0809,
author = { Tarek M. Mahmoud, Abdelmgeid A. Aly, Omar Makram M },
title = { A Modified AODV Routing Protocol to Avoid Black Hole Attack in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 6 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 27-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number6/19195-0809/ },
doi = { 10.5120/19195-0809 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:44:06.961840+05:30
%A Tarek M. Mahmoud
%A Abdelmgeid A. Aly
%A Omar Makram M
%T A Modified AODV Routing Protocol to Avoid Black Hole Attack in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 6
%P 27-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc networks (MANETs) are composed of a set of stations (nodes) communicating through wireless channels, without any fixed backbone support in which nodes are allowed to join and leave the network at any point of time. MANETs are generally more vulnerable to information and physical security threats than wired networks, so security is an essential requirement in MANETs to provide secured communication between mobile nodes. One of the most common attacks against routing in MANETs is the Black Hole attack. A black hole is a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this paper, we attempt to focus on improving the security of one of the popular routing protocol for MANETS, namely the Ad hoc On Demand Distance Vector (AODV) routing protocol to avoid black hole attacks. The proposed Intrusion Avoidance System (IASAODV) can be considered as modification of the AODV protocol and can be used to detect and avoid the black hole attack. The conducted experimental results using Network Simulator NS-2. 35 show an improvement in Packet Delivery Ratio (PDR), Normalized Routing Load (NRL) and throughput using the proposed protocol compared with AODV routing Protocol in the case of existing black hole attack.

References
  1. Shree. P Vidya and Reena. G Sophia, "A Survey Of Various Routing Protocols In Mobile Ad-Hoc Networks (MANET)," International Journal of Computer Science & Engineering Technology (IJCSET), vol. 3, pp. 224-228, 2012.
  2. Yi Seung, Naldurg Prasad, and Robin Kravets, "Security-Aware Ad hoc Routing for Wireless Networks," University of Illinois at Urbana-Champaign Champaign, IL, USA ©2001 , Technical Report 2001.
  3. W. Stallings, Cryptography and Network Security: Principles and Practices, 3rd edition. New Jersey: Prentice Hall, 2003.
  4. Wu Bing, Chen Jianmin, Wu Jie, and Cardei Mihaela, "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", Springer, 2006.
  5. E Perkins Charles, M Belding-Royer Elizabeth, and SamirDas, "Ad-Hoc On-Demand Distance Vector (AODV) Routing," in Proceedings of IEEE WMCSA'99, New Orleans, 1999.
  6. Human-centric Computing and Information Sciences, a Springer Open Journal, November 2011 [Online]. Hyperlink "http://www. hcis-journal. com/content/1/1/4"
  7. Tseng Chin-Yang, Balasubramanyam Poornima, and Ko Calvin, "A Specification-based Intrusion Detection System for AODV" in Proceedings of 1st ACM workshop on security of Ad Hoc and sensor networks, California, Davis, 2003, pp. 125-134.
  8. Sitapara Nishant and Sandeep B. Vanjale, "Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks," in International Conference on Emerging trends in engineering "ICETE-201O" , Jasingpur, 2010.
  9. Himral Lalit, Vig Vishal, and Chand Nagesh, "Preventing AODV Routing Protocol from Black Hole Attack", International Journal of Engineering Science and Technology (IJEST), vol. 3, pp. 3927-3932, 2011.
  10. Yang Su Ming, "Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems," Elsevier Computer Communications, vol 34, pp. 107-117, 2011.
  11. Von Mulert Jan, Welch n Ian, and Winston K. G. Seah, "Security threats and solutions in MANETs: A case study using AODV and SAODV," Journal of Network and Computer Applications, vol. 35, pp. 1249–1259, 2012.
  12. Khare Shashank, Sharma Manish, Dixit Namrata, and Agrawal Sumit, "Security in Routing Protocol to Avoid Threat of Black Hole Attack in MANET," VSRD International journal of Electrical, Electronics and Communication Engineering, vol. 2 (6), pp. 385-390, 2012.
  13. Ghonge Mangesh and S. U. Nimbhorkar, "Simulation of AODV under Blackhole Attack in MANT," International Journal of Advanced Research in Computer Science and Software Engineering", 2012.
  14. Nabarun Chatterjee and Jyotsna Kumar Mandal, "Detection of Blackhole Behavior using Triangular Encryption in NS2," 1st International Conference on Computational Intelligence: Modeling Techniques and Applications(CIMTA- 2013), pp. 524-529, 2013.
  15. Sharma Ajay, Babu, Ahirwar Rajesh, and Patil Smita, "Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), pp. 79-82, 2012.
  16. Su Mon Bo, Xiao Hannan, Adereti Aderemi, and James A, "A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack," in Third International Symposium on Information Assurance and Security, 2007, pp. 50-55.
  17. The Network Simulator - NS-2 [Online]. Hyperlink "http://www. isi. edu/nsnam/ns/"
  18. K Fall and K Varadhan, "The NS Manual", the VINT Project, UC Berkeley. , 2011.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs AODV Routing Protocol IASAODV Protocol Black Hole Attack and NS2.