scholarly journals Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Author(s):  
Ashok Koujalagi
2012 ◽  
Vol 11 (4) ◽  
pp. 65-76
Author(s):  
Arunangshu Pal ◽  
Prasenjit Choudhury

With the advancement of wireless technologies, Mobile Ad hoc NETwork (MANET) has been an important field of study. MANETs find useful applications in the real world, for example in military battlefield and disaster management. Since MANET is dynamic in nature, it must be represented by dynamic graph. Evolving graph, a form of dynamic graph, may be used for the purpose. When we talk about a network, a routing protocol comes into the question, and one of the most popular routing protocols is AODV. However, since AODV suffers from a drawback that it may be a victim of black hole attack, we need to find a technique to eliminate the possibility of the phenomenon. This paper makes a study of MANET and an efficient way of representing MANET by dynamic graph. It explains the AODV routing technique and the black hole attack. It then extends the idea of dynamic graph to propose a technique to solve the problem of black hole attack in AODV.


2010 ◽  
Vol 40-41 ◽  
pp. 457-461
Author(s):  
Xiao Yun Chen ◽  
Yu Kai Yao ◽  
Guo Hua Liu ◽  
Long Jie Li

Mobile Ad hoc Network (MANET) has attracted lots of research efforts these years, mainly due to its appealing applications in no infrastructure situations such as battle fields and disaster recovery operations [1]. In this paper, we explore wireless Ad Hoc network focusing on its Routing Protocol AODV, we in depth analyze its operation principles and the problems exist in AODV routing protocol. AODV routing protocol is vulnerable, it is always exposed to many attacks, such as DoS, black hole, etc. [2] Through exhaustive researching the behaviors of black hole attack in NS2 simulation platform, and we finally propose a new routing security strategy to defense the black hole attack in AODV. Simulation results show that the strategy we proposed can not only effectively defense the black hole nodes, but also has better routing performance for moderate or small scale Ad Hoc Networks.


2014 ◽  
Vol 989-994 ◽  
pp. 4482-4487
Author(s):  
Xiao Jing Meng ◽  
De Yu Lin ◽  
De Qin Lin ◽  
Rong Hua

Mobile Ad Hoc network is a self-composing network with a highly dynamic network topology. Although it has many advantages, there are still some safety problems in it. One of these problems is the black hole attack. The black hole attack is a typical attack to the Ad Hoc network and is also the main threat facing it. In this paper, the safety problems exist in the AODV protocol, which is a kind of routing protocol in the Ad Hoc, has been analyzed in detail. In the meanwhile, an improved Secure Ad Hoc On-Demand Distance Vector Routing called OSAODV has been proposed and realized based on the NS2. Finally, three set of experiments have been made, the results have shown that the OSADOV can avoid the black hole attack very well.


Author(s):  
Ali Ayid Ahmad ◽  
Ahmed Chalak Shakir

Mobile Ad Hoc Network is an infrastructure less wireless network where the mobile nodes leaves and joins the mobile network very frequently. The routing of the packets from source node to destination node, the routing protocol is used. On Demand Distance Vector Routing protocol is very common and implemented with Mobile Ad Hoc Network nodes to handle the operations of packet routing from by any node as a source node to destination node. In this paper prevention of black hole attack by modifying the On Demand Distance Vector routing protocol. The sequence number of 32 bit is initiated with the Route Reply and route sequence packet broadcast to determine the request reply from black hole node under the Mobile Ad Hoc Network. The sequence number and On demand Distance Vector Routing protocol are integrated with a mechanism to find the Request Reply of message containing routing information from source to destination node in Mobile Ad Hoc Network.


Mobile Ad hoc network is a temporary network. It helps to communicate two or more devices for short range. Routing Protocols are use to establish a communication in MANET. As it is a open network , it has many vulnerabilities from security point. Black hole Attack is one of the major concern in MANET. In this paper, we have implemented Black hole Attack in random mobility environment and analyse its impact on MANET using various parameters for single and multiple connection in MANET. Black hole attack disturbs one of the connection in the network while remaining connection are unaffected. During our analysis, we found that performance result of black hole attack in multiple connection network give a similar kind of output mentioned in various research paper related to gray hole attack, which will make difficult to analysis the type of attack in the network.


Sign in / Sign up

Export Citation Format

Share Document