A SOLUTION TO DETECT BLACKHOLE ATTACK BASED ON T3-AODV PROTOCOL IN MANET

2021 ◽  
Author(s):  
Mai Cuong Tho ◽  
Vo Thanh Tu
2013 ◽  
Vol 684 ◽  
pp. 547-550
Author(s):  
Sery Vuth Tan ◽  
Minh Yuk Choi ◽  
Kee Cheon Kim

Mobile Ad-hoc Network (MANET) is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks. One of these attacks is BlackHole. In this attack, a malicious node advertises itself as having a high sequence number and a shortest path to a specific node to absorb packets. The effect of BlackHole attack on ad-hoc network using AODV as a routing protocol will be examined in this research. We also propose a new mechanism, called DPBA-AODV, to detect and prevent BlackHole attacks on AODV protocol. Simulation result, by using NS2, depicts the efficiency of our proposed mechanism in packet delivery ratio under the presence of BlackHole nodes.


IARJSET ◽  
2015 ◽  
Vol 2 (12) ◽  
pp. 78-82
Author(s):  
Satyendra Soni ◽  
Margi Patel ◽  
Nitin Rathore

2017 ◽  
Vol 26 (5) ◽  
pp. 240-248 ◽  
Author(s):  
Yugarshi Shashwat ◽  
Prashant Pandey ◽  
K. V. Arya ◽  
Smit Kumar

Author(s):  
Divya Singh ◽  
Sumit Jalan

In Wireless ad-hoc network, the infrastructure of MANET's differ to each other due to the topology of MANETs changes time to time because the mobile nodes of MANET's are movable. In MANETs protocols, if any node wants to communicate with another node then they establish a path with the help of adjacent node due to this the security in MANETs protocol is vulnerable. Thus, there are various types of attacks are try to break the security of MANETs protocol. AODV is a popular and most usable protocol of MANET and Black Hole Attack is a severe attack that affects the functionality of AODV protocol. The malicious node treat to the source node which have freshest and nearest path for the destination. In this work, my prime focus specifically is on follow the security against Black Hole Attack. I proposed AODV protocol capture some extra effort for source node and destination node which based on best possible effort (heuristic) with appropriate simulation using ns-2.35.


Sign in / Sign up

Export Citation Format

Share Document