We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Enhanced Detection Technique for Blackhole Attack in MANET

by Nivedita Leo, Sharda Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 1
Year of Publication: 2017
Authors: Nivedita Leo, Sharda Patel
10.5120/ijca2017915466

Nivedita Leo, Sharda Patel . An Enhanced Detection Technique for Blackhole Attack in MANET. International Journal of Computer Applications. 175, 1 ( Oct 2017), 14-19. DOI=10.5120/ijca2017915466

@article{ 10.5120/ijca2017915466,
author = { Nivedita Leo, Sharda Patel },
title = { An Enhanced Detection Technique for Blackhole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 175 },
number = { 1 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number1/28452-2017915466/ },
doi = { 10.5120/ijca2017915466 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:23:53.929711+05:30
%A Nivedita Leo
%A Sharda Patel
%T An Enhanced Detection Technique for Blackhole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 1
%P 14-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad-hoc network (MANET) is a self-optimizing infrastructure-less network. AODV (Ad-hoc On-demand Distance Vector) routing protocol is a loop free protocol used in ad-hoc networks. It is designed such that it can self-start in an environment where all the nodes are mobile in nature. It can also resist a variety of network behaviors such as mobility, failure of links and much more. The ad-hoc network is susceptible to black-hole attack. In a black hole attack, the router drops the packets instead relaying them and is a type of denial-of-service attack. The proposed work enhances the AODV routing protocol for detecting a black hole attack more efficiently and hence reducing the delay and communication overhead in the MANET. In the proposed work, the behavior of the source node is modified by broadcasting the pirated RREQ which includes its own sequence number instead of destination sequence number and preprocess RREP () function is also added which makes it more secure than the existing solutions. For this the network simulation 2.35 is used. The results obtained from the proposed methodology shows that the end-to-end delay has been decreased; packet delivery ratio and throughput have been increased.

References
  1. A. A. Chavan, Prof. D.S.Kuruleb, Prof. P.U.Derec. “Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against BlackHole Attack”. 7th International Conference on Communication, Computing and Virtualization 2016, Published by Elsevier B.V.
  2. Ali Dorri, HamedNikdel, “A New Approach for Detecting and Eliminating Cooperative Black hole Nodes in MANET”,IKT20157thInternational Conference on Information Knowledge & Technology, 978-1-4673-7485-9/15/$31.00©2015 IEEE.
  3. Chhabra, M.,Gupta, B., &Almomani, A. (2013). “A novel solution to handle DDOS attack in MANET’. Journal of Information Security, 4(3), 165–179.
  4. Jamali, S.B.S. (2015). “A survey over black hole attack detection in mobile ad hoc network”. International Journal of Computer Science and Network Security (IJCSNS), 15, 44
  5. Kurosawa, S.,Nakayama, H., Kato, N., Jamalipour, A., &Nemoto, Y. (2007). “Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method”. IJ Network Security, 5, 338–346.
  6. KritiPatidar, Vandana Dubey “Modification in Routing Mechanism of AODV for DefendingBlackhole and Wormhole Attacks” 978-1-4799-3064-7/14/$31. 00©20 14 IEEE.
  7. Monika Y. Dangore, Mr Santosh S. Sambare, “Detecting A Overcoming Blackhole Attack In Aodv Protocol” 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies, 978-0-4799-2235-2/13 $26.00 © 2013 IEEEDOI 10.1109/CUBE.2013.23
  8. Neha Sharma, Anand Singh Bisen, “Detection As Well As Removal of Blackhole Attack In MANET”, InternationalConference on Electrical, Electronics, and Optimization Techniques (ICEEOT) –2016, 978-1-4673-9939-5/16/$31.00 ©2016 IEEE.
  9. NishuKalia, Harpreet Sharma, “Detection of Multiple Black hole nodes attack in MANETby modifying AODV protocol” International Journal on Computer Science and Engineering (IJCSE), ISSN: 0975-3397 Vol.8 No.5 May 2016.
  10. Piyush Khemariya, Upendra Kumar Purohit & Umesh Barahdiya, “Performance Study of Improved Aodv against Black Hole Attack In Wireless Environment”, International Journal of Engineering Research &ModernEducation,2016
  11. Satria Mandala1, Abdul Hanan Abdullah, Abdul Samad Ismail, Habibollah Haron, Md. Asri Ngadi, Yahaya Coulibaly, “A Review of Blackhole Attack Mobile Ad hoc Network”, 2013 3rd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME)339 Bandung, November 7-8, 2013, 978-1-4799-1650-4/13 $31.00 © 2013.
  12. Sina Shahabi, Mahdieh Ghazvini1, Mehdi Bakhtiarian3, “A modified algorithm to improve security and performance of AODV protocol against black hole attack”, Springer Science+Business Media New York 2015
  13. Siddharth Dhama, Sandeep Sharma, Mukul Saini, “Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks”, 978-9-3805-4421-2/16/$31.00_c 2016 IEEE.
  14. T.Poongodi, M.Karthikeyan., “Localized Secure Routing Architecture against Cooperative Black Hole Attack in Mobile Ad Hoc Networks” Springer Science+Business Media New York 2016
  15. Vimal Kumar and Rakesh Kumar, “An Adaptive Approach for Detection of Black hole Attack in Mobile Adhoc Network”, International Conference on Intelligent Computing, Communication & Convergence, 1877-0509 © 2015 The Authors. Published by Elsevier B.V. Peer-review under responsibility of scientific committee of International Conference on Computer, Communication and Convergence (ICCC 2015) doi: 10.1016/j.procs.2015.04.122
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV Black hole Attack NS-2