CFP last date
20 January 2025
Reseach Article

A Literature Survey on Black Hole Attacks on AODV Protocol in MANET

by Ravi Kant, Sunil Gupta, Harsh Khatter
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 16
Year of Publication: 2013
Authors: Ravi Kant, Sunil Gupta, Harsh Khatter
10.5120/13953-1801

Ravi Kant, Sunil Gupta, Harsh Khatter . A Literature Survey on Black Hole Attacks on AODV Protocol in MANET. International Journal of Computer Applications. 80, 16 ( October 2013), 22-26. DOI=10.5120/13953-1801

@article{ 10.5120/13953-1801,
author = { Ravi Kant, Sunil Gupta, Harsh Khatter },
title = { A Literature Survey on Black Hole Attacks on AODV Protocol in MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 16 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 22-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number16/13953-1801/ },
doi = { 10.5120/13953-1801 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:42.825232+05:30
%A Ravi Kant
%A Sunil Gupta
%A Harsh Khatter
%T A Literature Survey on Black Hole Attacks on AODV Protocol in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 16
%P 22-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile ad-hoc network (MANET) is a latest and emerging Research topic among researchers. The reason behind the popularity of MANET is flexibility and independence of network infrastructure. MANET have some unique characteristic like dynamic network topology, limited power and limited bandwidth for communication. MANET has more challenge compare to any other conventional network. The most common routing protocols used in ad-hoc network are AODV (ad-hoc on demand distance vector) protocol. AODV protocol is threatened by "Black Hole" attack. In black hole attack a malicious node advertise itself as having the4 shortest path to the destination node. To combat with black hole attack so many solutions provided by researchers. In this article we study the routing security issue of MANET and analyze in detail one type of attack the "Black hole" attack. We also provide a detailed list of solutions which protect the black hole in MANET's.

References
  1. C. Perkins, Ad Hoc Networks, Addison-Wesley, 2001.
  2. S. Ci et al. , "Self-Regulating Network Utilization in Mobile Ad-Hoc Wireless Networks,"IEEE Trans. Vehic. Tech. , vol. 55, no. 4, July 2006, pp. 1302–10.
  3. M. Zapata, Secure Ad Hoc On-Demand Distance Vector (SAODV). Internet draft, draft-guerrero-manet-saodv-01. txt, 2002.
  4. Y. Hu, A. Perrig, and D. Johnson, Ariadne: A Secure On-Demand Routing for Ad Hoc Networks. Proc. of MobiCom 2002, Atlanta, 2002.
  5. Y. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing. IEE Security & Privacy, pp. 28-39, 2004.
  6. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, 2002.
  7. Y. Hu, A Perrig, and D. Johnson, Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks. Proc. of IEEE INFORCOM, 2002.
  8. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002
  9. C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc Ondemand Distance Vector (AODV) Routing," IETF RFC 3561, July 2003.
  10. Deng H. , Li W. and Agrawal, D. P. , "Routing securi ty in wireless ad hoc networks," Communications Magazine, IEEE, vol. 40, no. 10, pp. 70- 75, October 2002.
  11. Mohammad Al-Shurman et. Al" Black Hole Attack in Mobile Ad-Hoc Network" ACMSE'04, Apri l 2-3, 2004, Huntsville, AL, USA .
  12. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipthey, and Yoshiaki Nemoto, "Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method", International Jtheynal of Network Securi ty, Vol. 5, Issue 3, pp: 338–346, 2007
  13. Latha Tamilselvan, V. Sankaranarayanan, "Prevention of Co-operative Black Hole Attack in MANET", Journal of Networks, Vol 3, No 5, 13-20, May 2008
  14. Zhao Min; Zhou Jiliu, "Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks", Information Engineeri ng and Electronic Commerce, 2009. IEEC '09. International Symposium on, vol. , no. , pp. 26-30, 16-17 May 2009.
  15. XiaoYang Zhang; Sekiya, Y. ; Wakahara, Y. , "Proposal of a method to detect black hole attack in MANET," Autonomous Decentralized Systems, 2009. ISADS '09. International Symposium on, vol. , no. , pp. 1-6, 23-25 March 2009.
  16. Payal N. Raj1 and Prashant B. Swadas2, "DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET", IJCSI International Jtheynal of Computer Science Issues, Vol. 2, 2009.
  17. Alem, Y. F. ; Zhao Cheng Xuan; , "Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection," Future Computer and Communication (ICFCC), 2010 2nd
  18. Ming-Yang Su, "Prevention of Selective Black hole Attacks on Mobile Ad hoc Network through Intrusion Detection Systems", Computer Communications, 2010. Communications, 2007, pp. 21-26.
  19. Lalit Himral, Vishal Vig, Nagesh Chand, "Preventing AODV Routing Protocol from Black Hole Attack" International Jtheynal of Engineeri ng Science and Technology (IJEST) Vol. 3 No. 5 May 2011.
  20. Kamarulari fin Abd. Jalil, Zaid Ahmad, Jamalul-Lail Ab Manan, "Mitigation of Black Hole Attacks for AODV Routing Protocol", Society of Digital Information and Wireless Communications (SDIWC) Vol01_No02_30, 2011.
  21. Kitisak Osathanunkul and Ning Zhang" A Countermeasure to Black Hole Attacks in Mobile Ad hoc Networks" 978-1-4244-9573-3/11/$26. 00 ©2011 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Security Black hole attack AODV and Packet dropping.