Black Hole Attack Prevention in AODV Routing Protocol

Author(s):  
Chetna N. Pushpatode ◽  
Swati V. Sankpal
2017 ◽  
Vol 168 (8) ◽  
pp. 27-33 ◽  
Author(s):  
Sarita Badiwal ◽  
Aishwary Kulshrestha ◽  
Neeraj Garg

2020 ◽  
Vol 12 (2) ◽  
pp. 25-46
Author(s):  
T. Aditya Sai Srinivas ◽  
S S Mani Manivannan

Workers or labors who are working in construction sites are prone to severe risks such as death, injuries happened due to accidents, falls and stuck in between objects. Internet of things (IoT) based sensors can be utilized to monitor the behavior of workers when they are in danger zones/areas. To safeguard site workers, supervisors or site managers should monitor and alert them when they are in danger. Data will be routed from site worker to supervisor, during this routing process data is subjected to routing attacks such as black hole attack and so on, due to wireless transmission. This article addresses the problem of black hole attack that happens during the wireless transmission between nodes and the base station (BS) of IoT-based civil construction. The proposed solution Collaborative Black Hole Attack – Ad Hoc On-Demand Distance Vector routing protocol (CBHA-AODV) prevents the collaborative black hole attack by 87.72%.


2015 ◽  
Vol 109 (6) ◽  
pp. 27-33 ◽  
Author(s):  
Tarek M.Mahmoud ◽  
Abdelmgeid A. Aly ◽  
Omar Makram M

2014 ◽  
Vol 573 ◽  
pp. 418-423
Author(s):  
S. Asha Latha ◽  
A. Sivabalan

Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).


Sign in / Sign up

Export Citation Format

Share Document