We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

An Approach to Combat the Blackhole Attack in AODV Routing Protocol

by Rohit Pal, Mukesh Azad, Santosh Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 11
Year of Publication: 2013
Authors: Rohit Pal, Mukesh Azad, Santosh Kumar
10.5120/13437-1011

Rohit Pal, Mukesh Azad, Santosh Kumar . An Approach to Combat the Blackhole Attack in AODV Routing Protocol. International Journal of Computer Applications. 77, 11 ( September 2013), 13-19. DOI=10.5120/13437-1011

@article{ 10.5120/13437-1011,
author = { Rohit Pal, Mukesh Azad, Santosh Kumar },
title = { An Approach to Combat the Blackhole Attack in AODV Routing Protocol },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 11 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 13-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number11/13437-1011/ },
doi = { 10.5120/13437-1011 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:49:59.831486+05:30
%A Rohit Pal
%A Mukesh Azad
%A Santosh Kumar
%T An Approach to Combat the Blackhole Attack in AODV Routing Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 11
%P 13-19
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This article consists of a brief description of various issues on security of Ad hoc networks as well as counter work against Black Hole Attack. A Combat Approach against Black Hole Attack is truly based on Cooperation of individual nodes of MANET. In this Approach each individual node act as intrusion detection system and monitors each request that it receives to avoid the attack. For this we use the routing table as well as to authenticate the sender node. We use ns2 for implementation and to simulate the proposed algorithm.

References
  1. Jaspal Kumar, M. Kulkarni, Daya Gupta," Effect of Black Hole Attack on MANET Routing Protocols" , I. J. Computer Network and Information Security,Volume-5,pp-64-72, April 2013
  2. Mukesh Azad, Rohit Pal, Jyoti Nautiyal, Mukesh Panday, Kuldeep Kumar ?Review of Emerging Threats, Vulnerabilities and Techniques of Security on Mobile Ad hoc Networks? UACEE International Journal of Advances in Computer Networks and its Security - Volume 2: Issue 3 [ISSN 2250 - 3757]
  3. Lidong Zhou , Zygmunt J. Haas, "Securing Ad Hoc Networks," Cornell University Ithaca, NY 14853
  4. William Stallings, Cryptography and Network Security Principles and Practices, 4th Ed
  5. Yuh-Ren Tsai, Shiuh-Jeng Wang, "Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks," IEEE 2004.
  6. Zhou, Z. J. Haas, "Securing ad hoc networks," IEEE NetworkMag. 13 (November/December 1999) 24–30.
  7. Y. Zhang, W. Lee, "Intrusion detection in wireless ad-hoc networks," in: SixthInternational Conference on Mobile Computing and Networking (MOBICOM'00), August 2000,pp. 275–283.
  8. Lakshmi Venkatraman and Dharma P. Agrawal, "Strategies for enhancing routing security in protocols for mobile ad hoc networks," Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks, Volume 63 Issue 2, February 2003, Pages 214 - 227
  9. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , ?A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks ,? Wireless/Mobile Network Security, Y. Xiao, X. Shen, and D. -Z. Du (Eds. ) pp, @ 2006 Springer.
  10. Payal N. Raj and Prashant B. Swades, ?DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET? , IJCSI International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814.
  11. Kamanshis Biswas and Md. Liakat Ali, "Security Threats in Mobile Ad Hoc Network", Master Thesis, Thesis no: MCS-2007:07, March 22, 2007.
  12. Jain, S. , Jain, M. , and Kandwal, Advanced algorithm for detection and prevention of cooperative black and gray hole attacks in mobile ad hoc networks. J. Computer Applications, 2010, Vol. 1, No. 7, pp. 37-42.
  13. Baadache, and Belmehdi, Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks, J. Comp. Sci. and Info. Security, 2010, Vol. 7, No. 1, pp. 10-16.
  14. Vaithiyanathan, Gracelin Sheeba. R, Edna Elizabeth. N, Dr. S. Radha, ?A Novel method for Detection and Elimination of Modification Attack and TTL attack in NTP based routing algorithm?, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing 978-0-7695-3975-1/10 $25. 00 © 2010 IEEE.
  15. Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard, Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. Paper presented at the International
  16. Weerasinghe H, Fu H (2007) Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. Paper presented at the Future Generation Communication and Networking, Jeju-Island, Korea, 6-8 December 2007
  17. Yu CW, Wu T-K, Cheng RH, Chang SC, A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Network. Paper presented at the PAKDD workshops, Nanjing, China, 22-25 May 2007
  18. Wang W, Bhargava B, Linderman M, Defending against Collaborative Packet Drop Attacks on MANETs. Paper presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009.
  19. Min Z, Jiliu Z, Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks. Paper presented at the International Symposium on Information Engineering and Electronic Commerce, Ternopil, Ukraine, 16-17 May 2009
  20. Vishnu KA, Paul J, Detection and Removal of Cooperative Black/Gray hole attack in Mobile Ad Hoc Networks. International Journal of Computer Applications,2010, 1(22):38–42. doi: 10. 5120/445-679
  21. Tsou P-C, Chang J-M, Lin Y-H, Chao H-C, Chen J-L, Developing a BDSR Scheme to Avoid Black Hole Attack Based on Proactive and Reactive Architecture in MANETs. Paper presented at the 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, 13-16 Feb. 2011
  22. S. Corson and J. Macker, "Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations," RFC 2501, IETF Network Working Group, January 1999.
  23. E. C. H. Ngai, J. Liu, and M. R. Lyu. "On the intruder detection for sinkhole attack in wireless sensor networks," in Proceedings of the IEEE International Conference on Communications (ICC 06), Istanbul, Turkey, June 2006.
  24. M. Zorzi and R. R. Rao, "Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Multihop Performance," IEEE Trans. Mobile Computing, vol. 2, no. 4, Oct. -Dec. 2003.
  25. D. Ganesan, R. Govindan, S. Shenker and D. Estrin, "Highly Resilient, Energy Efficient Multipath Routing in Wireless Sensor Networks," Mobile Computing and Communications Review (MC2R) Volume 1, (2002).
  26. J. R. Douceur,(2002) "The Sybil Attack," in 1st International Workshop on Peer-to-Peer Systems (IPTPS'02).
  27. Rouba El Kaissi, Ayman Kayssi, Ali Chehab and Zaher Dawy, (2005)" DAWWSEN: A Defense Mechanism against Wormhole ttack In Wireless Sensor Network",Proceedings of the Second International Conference on Innovations in Information Technology (IIT'05).
  28. Adrian Perrig, John Stankovic, and David Wagner, (2004) "Security in wireless sensor networks", Commun. ACM, 47(6):53-57.
  29. Kalpana Sharma, M K Ghose, "Wireless Sensor Networks: An Overview on its Security Threats", IJCA Special Issue on "Mobile Ad-hoc Networks" MANETs, 2010
  30. Roberta, Bragg, Mark, Rhodes-Ousley, Keith Strassberg, The Complete Reference Network Security
  31. E. A. Mary Anita and V. Vasudevan, "Black Hole attack on multicast routing protocols," JCIT, Vol. 4, No. 2, pp. 64–68, 2009.
  32. Y. C. Hu, A. Perrig and D. B. Johnson "Rushing Attacks and Defense in Wireless Ad Hoc Networks Routing Protocol"; Proceedings of ACM WiSe2003, Sep, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Network Ad hoc Network Security Service Routing Protocols Routing Authentication Hash function and Secure Routing Protocols Attacks Secure Routing Protocol