We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

MAODV: To Identify a Secure Route Selection in MANET under Blackhole

by Sumer Singh, Chakshu Goel, Gurjeevan Sandhu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 22
Year of Publication: 2012
Authors: Sumer Singh, Chakshu Goel, Gurjeevan Sandhu
10.5120/9434-3871

Sumer Singh, Chakshu Goel, Gurjeevan Sandhu . MAODV: To Identify a Secure Route Selection in MANET under Blackhole. International Journal of Computer Applications. 58, 22 ( November 2012), 44-50. DOI=10.5120/9434-3871

@article{ 10.5120/9434-3871,
author = { Sumer Singh, Chakshu Goel, Gurjeevan Sandhu },
title = { MAODV: To Identify a Secure Route Selection in MANET under Blackhole },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 22 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 44-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number22/9434-3871/ },
doi = { 10.5120/9434-3871 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:03:15.186037+05:30
%A Sumer Singh
%A Chakshu Goel
%A Gurjeevan Sandhu
%T MAODV: To Identify a Secure Route Selection in MANET under Blackhole
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 22
%P 44-50
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Network (MANET) is an open loop infrastructure, having independent movement of each node without any decentralized control. Due to dynamic nature. MANET has a many security issues than conventional networks. In this paper Ad- Hoc on Demand Distance Vector (AODV) is used as a routing protocol in MANET. Many types of attack are introduced in MANET such as blackhole attack, wormhole attack, routing table overflow attack, routing cache poisoning attack etc. ,which occur due to the malicious node and degrade the achievement of AODV. In this paper, blackhole attack is taken into consideration which is more dangerous than other attacks. To maintain a secure route selection under blackhole attack, it is necessary to make a strong security proposal, which maintain the performance of network. This paper introduces a new security scheme which deals with MAODV (Modified Ad- Hoc on Demand Distance Vector) which enlarges the performance of network and eliminates the risk of blackhole attack in the presence of malicious node.

References
  1. A. Babakhouya, Y. Challal, and A. Bouabdallah, A simulation analysis of routingmisbehaviour in mobile ad hoc networks," pp. 592{597, 2008. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  2. S. Khan, N. Alrajeh, and K. Loo, Secure route selection in wireless meshnetworks," Computer Networks: The International Journal of Computer andTelecommunications Networking, vol. 56, no. 2, pp. 491{503, 2012.
  3. I. Raza and S. Hussain, Identi_cation of malicious nodes in an aodv pure ad hocnetwork through guard nodes," Computer Communications, vol. 31, no. 9, pp. 1796{1802, 2008.
  4. K. Vats, M. Sachdeva, K. Saluja, and A. Rathee, Simulation and performanceanalysis of olsr routing protocol using opnet," International Journal, vol. 2, no. 2, 2012.
  5. S. Abbas, M. Merabti, and D. Llewellyn-Jones, The e_ect of direct interactionson reputation based schemes in mobile ad hoc networks," pp. 297{302, 2011.
  6. H. Sun, C. Chen, L. Hsu, Y. Chen, and Y. Chen, Reliable data transmissiongainst packet dropping misbehavior in wireless ad hoc networks," pp. 419{424, 2011.
  7. N. Kang, E. Shakshuki, and T. Sheltami, Detecting forged acknowledgements inmanets," pp. 488{494, 2011.
  8. A. Abdalla, I. Saroit, A. Kotb, and A. Afsari, An ids for detecting misbehaviour nodes in optimized link state routing protocol," pp. 1{5, 2010.
  9. P. John and P. Vivekanandan, A framework for secure routing in mobile ad hocnetworks," pp. 453{458, 2012.
  10. G. Karri and P. Khilar, Routing misbehavior detection and reaction in manets,"1, vol. 1, pp. 80{85, 2010.
  11. M. Tamilarasi and T. Sundararajan, Secure enhancement scheme for detectingsel_sh nodes in manet," pp. 1{5, 2012
  12. S. Singh, P. Jain, P. Bindra, and C. Goel, Opnet based simulation and perfor-mance analysis of aodv and grp by varying number of misbehavior nodes. "
  13. T. Lacey, R. Mills, B. Mullins, R. Raines, M. Oxley, and S. Rogers, Ripsec{usingreputation-based multilayer security to protect manets," Computers & Security,2011.
  14. A. Ajina, G. R. shaktidhrma,study of energy efficient, power aware routingalgorithm and their applications. 2010 second international conference on machine learning and computing.
  15. S. Usha, S. Radha a collective network arbitration protocol to detect mac misbehavior inmanets2010
  16. Md. Sharma, M. Inamullah Misbehavior detection in mobile ad hoc networksusing Artificial Immune System approach 2011
  17. F. Xing, W. Wang on the survivability of wireless ad hoc Networks with node misbehaviors and failuresieee transactions on dependable and secure computing, vol. 7, no. 3, july-september 2010.
  18. K. Vats, M. Sachdeva, K. Saluja,Simulation and performance analysis of olsr routing protocol using opnet volume 2, issue 2 feb 2012.
  19. Q Li, G. Cao mitigating routing misbehavior in disruption tolerant networks ieee transactions on information forensics and security, vol. 7, no. 2, april 2012
  20. S. agrwal, S. Jain, S. Sharma Mobility based performance analysis of aodv and dymo under varying degree of node misbehaviour. Volume 30-No. 7,Sep2012
  21. N. Saquid, Md,SabbirViSim: A user-friendly graphical simulation tool for performanceanalysis of MANET routing protocols 2010 elsevier.
  22. A. Baadache, A. Belmunri Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networksJournal of Network and Computer Applications 35 (2012) 1130–1139
  23. M. Yang SuPrevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems Computer Communications 34 (2011) 107–117
  24. J. Muleret, I. Welechsecurity threats and solutions in manets: a case study using aodv and saodv Journal of Network and Computer Applications 35 (2012) 1249–1259
  25. P. Joshi Security issues in routing protocols in MANETs at network layer Procedia Computer Science 3 (2011) 954–960
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV MAODV Malicious node Security Blackhole attack