We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Approach of Detecting Black Hole Attack in MANET using Modified TAODV Protocol

by Rashika Indoria, Deepak Motwani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 12
Year of Publication: 2015
Authors: Rashika Indoria, Deepak Motwani
10.5120/ijca2015906770

Rashika Indoria, Deepak Motwani . An Approach of Detecting Black Hole Attack in MANET using Modified TAODV Protocol. International Journal of Computer Applications. 129, 12 ( November 2015), 7-11. DOI=10.5120/ijca2015906770

@article{ 10.5120/ijca2015906770,
author = { Rashika Indoria, Deepak Motwani },
title = { An Approach of Detecting Black Hole Attack in MANET using Modified TAODV Protocol },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 12 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number12/23123-2015906770/ },
doi = { 10.5120/ijca2015906770 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:12.016092+05:30
%A Rashika Indoria
%A Deepak Motwani
%T An Approach of Detecting Black Hole Attack in MANET using Modified TAODV Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 12
%P 7-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless ad hoc network is a network where nodes can communicate with each other without the support of infrastructure. It can be set up easily and quickly with low cost. The network is called ad-hoc because each node in the network is ready to forward the data for other nodes and so the decision of which nodes transfer the data is made dynamically based on the network connectivity. A Mobile Ad-Hoc Network is a bunch of collected free mobile nodes which can communicate to each other with the help of radio waves. This advantage makes these networks highly robust. There are so many attacks in mobile ad-hoc network but in this paper we focus on black hole attack. We have taken Trust based AODV routing protocol idea with the addition of Fuzzy Logic to focus on examine and improving the security of routing protocol for MANET. Our aim is to ensure the security of data packet against the black hole attacks. The throughput, packet delivery are used to determine the performance of AODV and TAODV. We are using Simulation tool on NS2, the throughput of Proposed TAODV is better as compare to Previous TAODV and Packet Delivery ratio is also better as compare to previous TAODV. .

References
  1. Tameem Eissa & Shukor Abdul Razak & Rashid Hafeez Khokhar & Normalia Samian “Trust-Based Routing Mechanism in MANET: Design and Implementation” Springer Science+Business Media, LLC 2011.
  2. J Jan von Mulert, Ian Welch , Winston K.G. Seah “Security Threats and Solutions in MANETs: A Case Study using AODV and SAODV” Elsevier 2012.
  3. Mohamed Amnai, Youssef Fakhri, Jaafar Abouchabaka, “Evaluation of Impact of Traffic VBR and Mobility on the Performance of AODV Routing Protocols in Mobile Ad hoc Networks”, IEEE, 2010.
  4. Mariannne. A. Azer, “Wormhole Attacks Mitigation in Ad Hoc Networks”, IEEE 2011, pp 561-568.
  5. Mohamed Amnai, Youssef Fakhri, Jaafar Abouchabaka, “Evaluation of Impact of Traffic VBR and Mobility on the Performance of AODV Routing Protocols in Mobile Ad hoc Networks”, IEEE, 2010
  6. Jayanta Biswas, Mukti Baraiand, and S.K.Nandy “Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks” IEEE.
  7. Ashish Sharma , Dinesh Bhuriya ,Upendra Singh , Sushma Singh” Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing” in International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014.
  8. Subash Chandra Mandhata, and Dr.Surya Narayan Patro”, “A counter measure to Black hole attack on AODV- based Mobile Ad-Hoc Networks”, IJCCT, 2011
  9. Iman Zangeneh, Sedigheh Navaezadeh, Abolfazl Jafari, “Presenting a New Method for Detection and Prevention of Single Black Holes Attack in AODV Protocol in Wireless Ad Hoc Network”, in International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 686 - 689, 2013.
  10. Jaspinder Kaur,Birinder Singh, “Detect and Isolate Black Hole Attack in MANET using AODV Protocol,” in International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 2, February 2014.
  11. Neelam Khemariya, Ajay Khuntetha,”An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs”in International Journal of Computer Applications (0975 – 8887) Volume 66– No.18, March 2013.
  12. Muneer Bani Yassein, Yaser Khamayseh, Bahaa Nawafleh, “Improved AODV Protocol to Detect and Avoid Black Hole Nodes in MANETs,”in The Sixth International Conference on Future Computational Technologies and Applications.
  13. Roopal Lakhwani, Sakshi Suhane,Anand Motwani, “Agent based AODV Protocol to Detect and Remove Black Hole Attacks,” in International Journal of Computer Applications (0975 – 8887) Volume 59– No.8, December 2012.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Black Hole Attack Trust Based AODV Routing Protocol Fuzzy Logic Load.