scholarly journals Countering of Black Hole Attack on Manet with AODV Protocol

Author(s):  
Gurwinder Singh

Abstract: Security in mobile ad-hoc network (MANET) is the most serious issue impacting performance of network. In general, routing methods is one of the complicated and exciting analysis places. In black hole attack, a harmful node uses its routing technique to be able to promote itself for having the quickest direction to the place node or to the bundle it wants to identify. In this research, performance of one of the most efficient solutions for preventing single black hole attack in MANET using AODV routing protocol will be investigated in terms of packet delivery ratio, packet loss percentage, average end-to-end delay, and route request overhead. This chapter describes the introduction, background of the study, research objectives and questions, the scope of the study and its primary objectives.

The security of the data which is transferred from source to destination is of prime importance in the mobile ad hoc network (MANET) or any kind of network to be very precise. If the data gets lost then the entire purpose of deploying and creating the network fails. Mobile ad hoc networks suffer from various attacks out of which black hole attack is considered the most dangerous one because in this attack the venomous node release all the packets received by it. The authors in EAODV has used the concept of fake route request packets to identify the black hole nodes in the grid. The proposed technique detects the malicious black hole node using the sequence numbers. The performance of the network has been examined based on end to end delay, packet delivery ratio, detection time, throughput and remaining energy. These parameters have shown improvement over the existing scheme.


Author(s):  
P. Subathra ◽  
S. Sivagurunathan

A Mobile Ad hoc Network (MANET) is a collection of wireless nodes communicating over multi-hop paths without any infrastructure. Nodes must cooperate to provide necessary network functionalities. The security in routing protocols like Dynamic Source Routing (DSR) can be compromised by a “Black Hole” attack. Here, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops them, leading to performance degradation. The situation becomes worse when two or more nodes cooperate and perform the “Cooperative black hole” attack. This chapter proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating the attacking nodes. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio, and false negative probability in comparison with trust and probe based schemes.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 6 ◽  
Author(s):  
Pandi Selvam Raman ◽  
Shankar K ◽  
Ilayaraja M

Mobile ad hoc networks (MANETs) are wireless infrastructure-less network consisting collection of autonomous nodes that communicate with each other in decentralized manner. Security remains major challenge due to its some unique characteristics like open medium, mobility and hence topology changes. Therefore, routing protocol for MANETs is much vulnerable to attacks. Black Hole is a type of attack, where malicious node falsely advertises itself having the shortest or optimal path to the destination node. This attack is more dangerous while a group of nodes are cooperating with each other.The objective of this paper is to design cluster based routing protocol and prevent it from the black hole attack. The simulation results show improvement in packet delivery ratio and control overhead.


Computers ◽  
2020 ◽  
Vol 10 (1) ◽  
pp. 2
Author(s):  
Tri Kuntoro Priyambodo ◽  
Danur Wijayanto ◽  
Made Santo Gitakarma

A Mobile Ad Hoc Network (MANET) protocol requires proper settings to perform data transmission optimally. To overcome this problem, it is necessary to select the correct routing protocol and use the routing protocol’s default parameter values. This study examined the effect of route request parameters, such as RREQ_RETRIES and MAX_RREQ_TIMOUT, on the Ad Hoc On-demand Distance Vector (AODV) protocol, which was then compared with the default AODV performance Optimized Link State Routing (OLSR) protocols. The performance metrics used for measuring performance were Packet Delivery Ratio (PDR), throughput, delay, packet loss, energy consumption, and routing overhead. The results show that the OLSR protocol has a smaller delay than the AODV protocol, while in other measurements, the AODV protocol is better than OLSR. By reducing the combination value of RREQ_RETRIES, MAX_RREQ_TIMEOUT in AODV routing to (2, 10 s) and (3, 5 s), the protocol’s performance can be improved. The two combinations result in an average increase in throughput performance of 3.09%, a decrease in delay of 17.7%, a decrease in packet loss of 27.15%, and an increase in PDR of 4.8%. For variations in the speed of movement of nodes, 20 m/s has the best performance, while 5 m/s has the worst performance.


Author(s):  
P. Subathra ◽  
S. Sivagurunathan ◽  
N. Ramaraj

A Mobile Ad hoc Network (MANET) is a collection of wireless computers (nodes) communicating over multi-hop paths, without infrastructures such as base stations and access points. Nodes must cooperate to provide necessary network functionalities. The Dynamic Source Routing (DSR) protocol is a principal routing protocol in MANET, where security can be compromised by a “Black Hole” attack. In this attack, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops all packets sent for forwarding, leading to performance degradation in the network. The situation becomes even more severe when two or more nodes cooperate and perform an attack called the “Cooperative Black Hole” attack. This article proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating both single and cooperative black holes, making the MANET resistant against such attacks. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio and false negative probability in comparison with trust and probe based schemes.


2013 ◽  
pp. 1127-1144
Author(s):  
P. Subathra ◽  
S. Sivagurunathan

A Mobile Ad hoc Network (MANET) is a collection of wireless nodes communicating over multi-hop paths without any infrastructure. Nodes must cooperate to provide necessary network functionalities. The security in routing protocols like Dynamic Source Routing (DSR) can be compromised by a “Black Hole” attack. Here, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops them, leading to performance degradation. The situation becomes worse when two or more nodes cooperate and perform the “Cooperative black hole” attack. This chapter proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating the attacking nodes. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio, and false negative probability in comparison with trust and probe based schemes.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Gholamreza Farahani

The characteristics of the mobile ad hoc network (MANET), such as no need for infrastructure, high speed in setting up the network, and no need for centralized management, have led to the increased popularity and application of this network in various fields. Security is one of the essential aspects of MANETs. Intrusion detection systems (IDSs) are one of the solutions used to ensure security in this network. Clustering-based IDSs are very popular in this network due to their features, such as proper scalability. This paper proposes a new algorithm in MANETs to detect black hole attack using the K-nearest neighbor (KNN) algorithm for clustering and fuzzy inference for selecting the cluster head. With the use of beta distribution and Josang mental logic, the trust of each node will be calculated. According to the reputation and remaining energy, fuzzy inference will select the cluster head. Finally, the trust server checks the destination node. If allowed, it notifies the cluster head; otherwise, it detects the node as a malicious node in the black hole attack in each cluster. The simulation results show that the proposed method has improved the packet loss rate, throughput, packet delivery ratio, total network delay, and normalized routing load parameters compared with recent black hole detection methods.


2014 ◽  
Vol 989-994 ◽  
pp. 4482-4487
Author(s):  
Xiao Jing Meng ◽  
De Yu Lin ◽  
De Qin Lin ◽  
Rong Hua

Mobile Ad Hoc network is a self-composing network with a highly dynamic network topology. Although it has many advantages, there are still some safety problems in it. One of these problems is the black hole attack. The black hole attack is a typical attack to the Ad Hoc network and is also the main threat facing it. In this paper, the safety problems exist in the AODV protocol, which is a kind of routing protocol in the Ad Hoc, has been analyzed in detail. In the meanwhile, an improved Secure Ad Hoc On-Demand Distance Vector Routing called OSAODV has been proposed and realized based on the NS2. Finally, three set of experiments have been made, the results have shown that the OSADOV can avoid the black hole attack very well.


Author(s):  
Divya Singh ◽  
Sumit Jalan

In Wireless ad-hoc network, the infrastructure of MANET's differ to each other due to the topology of MANETs changes time to time because the mobile nodes of MANET's are movable. In MANETs protocols, if any node wants to communicate with another node then they establish a path with the help of adjacent node due to this the security in MANETs protocol is vulnerable. Thus, there are various types of attacks are try to break the security of MANETs protocol. AODV is a popular and most usable protocol of MANET and Black Hole Attack is a severe attack that affects the functionality of AODV protocol. The malicious node treat to the source node which have freshest and nearest path for the destination. In this work, my prime focus specifically is on follow the security against Black Hole Attack. I proposed AODV protocol capture some extra effort for source node and destination node which based on best possible effort (heuristic) with appropriate simulation using ns-2.35.


Sign in / Sign up

Export Citation Format

Share Document