CFP last date
20 December 2024
Reseach Article

A Survey on Security Solutions of AODV Routing Protocol against Black Hole Attack in MANET

by Mohamedi M. Mjahidi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 15
Year of Publication: 2015
Authors: Mohamedi M. Mjahidi
10.5120/19900-2005

Mohamedi M. Mjahidi . A Survey on Security Solutions of AODV Routing Protocol against Black Hole Attack in MANET. International Journal of Computer Applications. 113, 15 ( March 2015), 6-11. DOI=10.5120/19900-2005

@article{ 10.5120/19900-2005,
author = { Mohamedi M. Mjahidi },
title = { A Survey on Security Solutions of AODV Routing Protocol against Black Hole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 15 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number15/19900-2005/ },
doi = { 10.5120/19900-2005 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:51:00.255019+05:30
%A Mohamedi M. Mjahidi
%T A Survey on Security Solutions of AODV Routing Protocol against Black Hole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 15
%P 6-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing features AODV has gained popularity compared to other routing protocols, but this protocol lacks a security features which make it more vulnerable to malicious attack particularly black hole attack. A single or cooperate black hole attacks when present in a network can deny any packet from source to reach the destination. This paper aims at presenting the current existing security techniques that are used to prevent and detect the black hole attacks in MANET.

References
  1. R. Yerneni and A. K. Sarje, "Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc," in Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on, 2012, pp. 1-5.
  2. N. Jadeja and R. Patel, "Performance evaluation of aodv, dsdv and dsr routing protocols using ns-2 simulator," Performance Evaluation, vol. 3, pp. 1825-1830, 2013.
  3. M. Roopak and B. Reddy, "Blackhole Attack Implementation in AODV Routing Protocol," International Journal of Scientific & Engineering Research, vol. 4, pp. 402-406, 2013.
  4. K. K. Varshney and P. Samundiswary, "Performance analysis of malicious nodes in IEEE 802. 15. 4 based wireless sensor network," in Information Communication and Embedded Systems (ICICES), 2014 International Conference on, 2014, pp. 1-5.
  5. A. Gurjar and A. Dande, "Black Hole Attack in Manet's: A Review Study," International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN, pp. 2319-4413, 2013.
  6. K. S. Chavda and A. V. Nimavat, "Removal of black hole attack in AODV routing protocol of MANET," in 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2013, pp. 1-5.
  7. N. Sharma and A. Sharma, "The black-hole node attack in MANET," in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, 2012, pp. 546-550.
  8. S. Agrawal and S. Jaiswal, "Study to Eliminate Threat of Black Hole of Network Worms in MANET. " International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012.
  9. M. Amaresh and G. Usha, "Efficient malicious detection for AODV in mobile ad-hoc network," in Recent Trends in Information Technology (ICRTIT), 2013 International Conference on, 2013, pp. 263-269.
  10. S. S. Narayanan and S. Radhakrishnan, "Secure AODV to combat black hole attack in MANET," in Recent Trends in Information Technology (ICRTIT), 2013 International Conference on, 2013, pp. 447-452.
  11. Y. F. Alem and Z. C. Xuan, "Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection," in Future Computer and Communication (ICFCC), 2010 2nd International Conference on, 2010, pp. V3-672-V3-676.
  12. M. Abdelhaq, S. Serhan, R. Alsaqour, and R. Hassan, "A local intrusion detection routing security over MANET network," in Electrical Engineering and Informatics (ICEEI), 2011 International Conference on, 2011, pp. 1-6.
  13. G. Wahane, A. M. Kanthe, and D. Simunic, "Technique for detection of Cooperative black hole attack using true-link in Mobile Ad-hoc Networks," in Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014 37th International Convention on, 2014, pp. 1428-1434.
  14. J. Sen, S. Koilakonda, and A. Ukil, "A mechanism for detection of cooperative black hole attack in mobile ad hoc networks," in Intelligent Systems, Modelling and Simulation (ISMS), 2011 Second International Conference on, 2011, pp. 338-343.
  15. A. Mishra, R. Jaiswal, and S. Sharma, "A novel approach for detecting and eliminating cooperative black hole attack using advanced dri table in ad hoc network," in Advance Computing Conference (IACC), 2013 IEEE 3rd International, 2013, pp. 499-504.
  16. K. Abd Jalil, Z. Ahmad, and J. Manan, "Securing Routing Table update in AODV routing protocol," in Open Systems (ICOS), 2011 IEEE Conference on, 2011, pp. 116-121.
  17. Z. Ahmad, K. Abd Jalil, and J. Manan, "Black hole effect mitigation method in AODV routing protocol," in Information Assurance and Security (IAS), 2011 7th International Conference on, 2011, pp. 151-155.
  18. A. Gupta, "Black hole attack mitigation method based on route discovery mechanism in AODV protocol," in Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on, 2013, pp. 1-6.
  19. R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, "A novel approach for grayhole and blackhole attacks in mobile ad hoc networks," in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, 2012, pp. 556-560.
  20. R. H. Jhaveri, "MR-AODV: a solution to mitigate blackhole and grayhole attacks in AODV based MANETs," in Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on, 2013, pp. 254-260.
  21. F. Thachil and K. Shet, "A trust based approach for AODV protocol to mitigate black hole attack in MANET," in Computing Sciences (ICCS), 2012 International Conference on, 2012, pp. 281-285.
  22. S. K. Dhurandher, I. Woungang, R. Mathur, and P. Khurana, "GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs," in Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on, 2013, pp. 357-362.
  23. S. Tan and K. Kim, "Secure Route Discovery for preventing black hole attacks on AODV-based MANETs," in ICT Convergence (ICTC), 2013 International Conference on, 2013, pp. 1027-1032.
Index Terms

Computer Science
Information Sciences

Keywords

AODV RREP RREQ MANET