CFP last date
20 January 2025
Reseach Article

An inquisition based Detection and Mitigating Techniques of AODV Protocol in Existence of Packet Drop Attacks

by Vrutik Shah, Nilesh Modi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 7
Year of Publication: 2013
Authors: Vrutik Shah, Nilesh Modi
10.5120/11851-7607

Vrutik Shah, Nilesh Modi . An inquisition based Detection and Mitigating Techniques of AODV Protocol in Existence of Packet Drop Attacks. International Journal of Computer Applications. 69, 7 ( May 2013), 1-7. DOI=10.5120/11851-7607

@article{ 10.5120/11851-7607,
author = { Vrutik Shah, Nilesh Modi },
title = { An inquisition based Detection and Mitigating Techniques of AODV Protocol in Existence of Packet Drop Attacks },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 7 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number7/11851-7607/ },
doi = { 10.5120/11851-7607 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:29:33.253112+05:30
%A Vrutik Shah
%A Nilesh Modi
%T An inquisition based Detection and Mitigating Techniques of AODV Protocol in Existence of Packet Drop Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 7
%P 1-7
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad hoc Network (MANET) is a collection of mobile nodes that can has no fixed or predetermined topology, with mobile nodes and dynamic membership changes. A self-organizing network is a network that can automatically extend, change, configure and optimize its topology, coverage, capacity, cell size, and channel allocation, based on changes in location, traffic pattern, interference, and the situation or environment. MANETs due to complete autonomy of the member nodes and lack of any centralized infrastructure are particularly vulnerable to different types of attacks and security threats. Packet drop attack is one of them. In this paper mechanism has been proposed to detect and defend against packet drop attacks. Simulation has been done using ns 2. 34 to evaluate the conventional AODV and proposed algorithm when packet drop attack is injected in network. The Result indicates that our proposed solution gives significant better performance then AODV in concern of Packet delivery ratio & Throughput with tolerable increase in routing overhead, End to End delay.

References
  1. C. E. Perkins, E. M. B. Royer and S. R. Das, " Ad-hoc On-Demand Distance Vector (AODV) Routing," Mobile Ad-hoc Networking Working Group, Internet Draft, draft-ietf-manetaodv- 00. txt, Feb. 2003.
  2. Hao Yang; Haiyun Luo; Fan Ye; Songwu Lu; Lixia Zhang; , "Security in mobile ad hoc networks: challenges and solutions," Wireless Communications, IEEE , vol. 11, no. 1, pp. 38- 47, Feb 2004.
  3. N. Bhalaji, A. Shanmugam, "A Trust Based Model to Mitigate Black Hole Attacks in DSR Based MANET", European Journal of Scientific Research, Vol. 50 No. 1, pp. 6-15, 2011.
  4. Raja Mahmood, R. A. ; Khan, A. I. ; , "A survey on detecting black hole attack in AODV-based mobile ad hoc networks," High Capacity Optical Networks and Enabling Technologies, 2007. HONET 2007. International Symposium on , vol. , no. , pp. 1-6, 18-20 Nov. 2007
  5. Al-Shurman, M. , Yoo, S. and Park, S, "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional Conference, pp. 96-97, 2004.
  6. Mohammad Abu Obaida, Shahnewaz Ahmed Faisal, Md. Abu Horaira, Tanay Kumar Roy, "AODV Robust (AODVR): An Analytic Approach to Shield Ad-hoc Networks from Black Holes" International Journal of Advanced Computer Sciences and Applications, Vol: 2 Issue: 8 Pages: 97-102, 2011.
  7. Songbai Lu; Longxuan Li; Kwok-Yan Lam; Lingyan Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack," Computational Intelligence and Security, 2009. CIS '09. International Conference on, vol. 2, no. , pp. 421-425, 11-14 Dec. 2009.
  8. Ming-Yang Su; Kun-Lin Chiang; Wei-Cheng Liao, "Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks," Parallel and Distributed Processing with Applications (ISPA), 2010 International Symposium on, vol. , no. , pp. 162-167, 6-9 Sept. 2010.
  9. Alem, Y. F. ; Zhao Cheng Xuan; , "Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection," Future Computer and Communication (ICFCC), 2010 2nd International Conference on , vol. 3, no. , pp. V3-672-V3-676, 21-24 May 2010.
  10. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto, "Detecting Black hole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method" International Journal of Network Security, Vo l. 5, No . 3, P P. 338–346, Nov. 2007.
  11. Zhao Min; Zhou Jiliu, "Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks", Information Engineering and Electronic Commerce, 2009. IEEC '09. International Symposium on, vol. , no. , pp. 26-30, 16-17 May 2009.
  12. Deng H. , Li W. and Agrawal, D. P. , "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol. 40, no. 10, pp. 70- 75, October 2002.
  13. Lalit Himral, Vishal Vig, Nagesh Chand, "Preventing AODV Routing Protocol from Black Hole Attack" International Journal of Engineering Science and Technology (IJEST) Vol. 3 No. 5 May 2011.
  14. F. J. Ros and P. M. Ruiz, "Implementing a New Manet Unicast Routing Protocol in NS2", December, 2004, http://masimum. dif. um. es/nsrt-howto/pdf/nsrthowto. pdf
  15. Shah Vrutik,Modi N,Patani A. "aodvgap-an acknowledgment based approach to mitigate selective forwarding attacks in manet" in international journal of computer engineering & technology (IJCET) ISSN 0976 – 6367(P) ISSN 0976 – 6375(Online) Volume 3, Issue 2, July- September (2012), pp. 458-469
  16. Osathanunkul, K. ; Ning Zhang; , "A countermeasure to black hole attacks in mobile ad hoc networks," Networking, Sensing and Control (ICNSC), 2011 IEEE International Conference on, vol. , no. , pp. 508-513, 11-13 April 2011.
  17. Sen, J. ; Koilakonda, S. ; Ukil, A. ; , "A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks", Intelligent Systems, Modelling and Simulation (ISMS), 2011 Second International Conference on , vol. , no. , pp. 338-343, 25-27 Jan. 2011.
  18. L. Eschenauer, V. Gligor, and J. Baras. On Trust Establishment in Mobile Ad-hoc Networks. Technical Report MS 2002-10, Institute for Systems Research, University of Maryland, 2002.
  19. X. Li, M. Lyu, and J. Liu. A Trust Model Based Routing Protocol for Secure Ad hoc Networks. In Proceedings of the Aerospace Conference, pages 1286–1295, March 2004.
  20. T. Ghosh, N. Pissinou, and K. Makki. Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad hoc Networks. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04), pages 224–231, Washington, DC, USA, 2004. IEEE Computer Society.
  21. N. Pissinou, T. Ghosh, and K. Makki. Collaborative Trust-Based Secure Routing in Multihop Ad hoc Networks. In NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, pages 1446–1451, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Black hole attack AODV Routing Security MANETs Packet drop attacks