CFP last date
20 January 2025
Reseach Article

An Enhanced Approach of Detection and Prevention of Black Hole Attack on AODV over MANET

by Jayshree Gojiya, Amit Nayak, Bimal Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 13
Year of Publication: 2016
Authors: Jayshree Gojiya, Amit Nayak, Bimal Patel
10.5120/ijca2016909971

Jayshree Gojiya, Amit Nayak, Bimal Patel . An Enhanced Approach of Detection and Prevention of Black Hole Attack on AODV over MANET. International Journal of Computer Applications. 142, 13 ( May 2016), 9-11. DOI=10.5120/ijca2016909971

@article{ 10.5120/ijca2016909971,
author = { Jayshree Gojiya, Amit Nayak, Bimal Patel },
title = { An Enhanced Approach of Detection and Prevention of Black Hole Attack on AODV over MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 13 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 9-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number13/24955-2016909971/ },
doi = { 10.5120/ijca2016909971 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:57.288403+05:30
%A Jayshree Gojiya
%A Amit Nayak
%A Bimal Patel
%T An Enhanced Approach of Detection and Prevention of Black Hole Attack on AODV over MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 13
%P 9-11
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc network is a situate of portable nodes that correspond with wireless links and communication acknowledged out without any central control or fixed communication. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time .this generic characteristic of MANET has rendered it vulnerable to security attacks. The black hole attack is one of such security risks. In this attack, a malicious node fallaciously advertise shortest path to the destination node with an intension to disrupt the communication In this paper, we intend a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs. The anticipated scheme uses Watchdog mechanism to detect malicious node with usage of local information of intermediate node and propagates the information of black hole node to all other node in network the simulation results show the efficiency of anticipated scheme in presences of black hole node.

References
  1. Hrishabha Raj Jain, Sanjay Kumar Sharma, “Improved Energy Efficient Secure Multipath AODV Routing for MANET”, IEEE international conference on advances in engineering & technology research (ICRETR-2014) August 01-02, 2014. .
  2. G. Varaprasad, Shivashankar, “Designing Energy Routing Protocol With Power Consumption Optimization in MANET”, IEEE TRANSACTION Vol. 2, no. 2, June-2014
  3. Uma Rathore Bhatt*, Priyanka Jain, Raksha Upadhyay, “Enhance AODV- An Energy Efficient Routing Protocol For MANET”, IEEE-2013.
  4. Alireza Shamsoshoara, Dr. Yousef Darmani, “Enhance Multi-Route Ad Hoc On-Demand Distance Vector Routing” Iranian Conference On Electrical Engineering(ICEE), IEEE-2015.
  5. Songbai Lu, Longxuan Li , Kwon-Yan Lam and Lingvan Jia “ SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack,” Proceedings of International Conference on Computational Intelligence and Security, 2009, pp. 421-425
  6. Hongmei Deng, Wei Li and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communication Magazine, Vol. 40, 2002, pp. 70-75
  7. Yibeltal Fantahun Alem and Zhao Cheng Xuan, “Preventing Black Hole Attack in Mobile Ad-Hoc Networks Using Anomaly Detection,” International Conference on Future Computer and Communication, 2010, pp. 672-676.
  8. A. Menaka Pushpa, “Trust Based Secure Routing in AODV Routing Protocol”, IEEE, 2009
  9. M. Medadian, M. H. Yektaie, A. M. Rahmani, “Combat with Black Hole Attack in AODV Routing Protocol in MANET”, AH-ICI 2009, First Asian Himalayas International Conference on Internet, November 2009, pp. 1-5.
  10. R.A. Raja Mahmood and A.I. Khan, “A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks”, Proceedings of International Symposium on High Capacity Optical Networks and Enabling Technologies, 2007, pp. 1-6.
Index Terms

Computer Science
Information Sciences

Keywords

ad hoc networks black hole AODV security routing.