We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Analysis of Black Hole Attack in MANET using AODV Routing Protocol

by Sarita Badiwal, Aishwary Kulshrestha, Neeraj Garg
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 8
Year of Publication: 2017
Authors: Sarita Badiwal, Aishwary Kulshrestha, Neeraj Garg
10.5120/ijca2017914484

Sarita Badiwal, Aishwary Kulshrestha, Neeraj Garg . Analysis of Black Hole Attack in MANET using AODV Routing Protocol. International Journal of Computer Applications. 168, 8 ( Jun 2017), 27-33. DOI=10.5120/ijca2017914484

@article{ 10.5120/ijca2017914484,
author = { Sarita Badiwal, Aishwary Kulshrestha, Neeraj Garg },
title = { Analysis of Black Hole Attack in MANET using AODV Routing Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 8 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 27-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number8/27897-2017914484/ },
doi = { 10.5120/ijca2017914484 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:37.304720+05:30
%A Sarita Badiwal
%A Aishwary Kulshrestha
%A Neeraj Garg
%T Analysis of Black Hole Attack in MANET using AODV Routing Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 8
%P 27-33
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks have become so popular in recent years that now a day almost every electronic gadget can be operated in wireless. Wireless ad hoc network is more vulnerable to security threats than wired network due to inherent characteristics and system constraints. This paper mainly addresses attacks due to misbehaving or malicious nodes. We have examined the effect of Black Hole attack on AODV routing and its detection method. I have simulated this attack and determined effect of this attack on network performance by different network scenario. I have also implemented detection method that help to isolates the malicious node in the network.

References
  1. Rutvij H. Jhaveri,Sankita J. Patel,Devesh C. Jinwala "Improving Route Discovery for AODV to Prevent Black hole and Grayhole Attacks in MANETs", INFOCOMP 2013.
  2. Geng Peng, Zou Chaanyun "Routing Attack and Solutions in Mobile ad hoc Network" IEEE-2006.
  3. Y.Zhang and W.Lee,”Intrusion detection in wireless ad-hoc networks”, 6th annual international Mobile computing and networking conference proceedings, 2000.
  4. Seungjoon Lee, Bohyung Han, Minho Shin; “Robust Routing in Wireless Ad Hoc Networks” 2002, international Conference.
  5. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto; “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, Vol.5, No.3, PP.338–346, Nov. 2007, PP:338-346.
  6. C. Perkins, E. Belding-Royer, S. Das, “RFC-3561 Ad hoc On-Demand Distance Vector (AODV) Routing”, pp. 1-32, July 2003.
  7. Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks”, IEEE JSAC, vol. 24, no. 2, Feb. 2006.
  8. Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection by Yibeltal Fantahum Alem & Zhao Hheng Xaun from Tainjin 300222, China 2010, IEEE.
  9. K. Natarajan and Dr. G. Mahadeven, "A Succinct Comparative Analysis and Performance Evaluation of MANET Routing Protocols", IEEE (ICCCI -2013), Jan. 04 – 06, 2013, Coimbatore, INDIA.
  10. Michalis Papadopoulos, Constandinos X. Mavromoustakis and Georgios Skourletopoulos", Performance Analysis of Reactive Routing Protocols in Mobile Ad hoc Networks", 2014 International Conference on Telecommunications and Multimedia (TEMU),IEEE.
  11. Performance Measurement in MANET BY Sandeep Kumar Arora, Mubashir Yaqoob Mantoo Mahnaz Chishti and Neha Chaudhary, 2014 5th International Conference-IEEE.
  12. A Simulation Study of Malicious Activities under Various Scenarios in Mobile Ad hoc Networks (MANETs) by Akshai Aggarwal, Nirbhay Chaubey and Keyurbhai A Jani from Gujrat, India 2013, IEEE.
  13. A Performance Analysis and Comparison of various Routing Protocols in MANET by M. Shobana and Dr. S. Karthik from Coimbatore-641035, 2013, IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Sequence number AODV Protocol Black Hole Attack