The New Mechanism to Detect and Prevent BlackHole Attacks on AODV-Based MANET

2013 ◽  
Vol 684 ◽  
pp. 547-550
Author(s):  
Sery Vuth Tan ◽  
Minh Yuk Choi ◽  
Kee Cheon Kim

Mobile Ad-hoc Network (MANET) is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks. One of these attacks is BlackHole. In this attack, a malicious node advertises itself as having a high sequence number and a shortest path to a specific node to absorb packets. The effect of BlackHole attack on ad-hoc network using AODV as a routing protocol will be examined in this research. We also propose a new mechanism, called DPBA-AODV, to detect and prevent BlackHole attacks on AODV protocol. Simulation result, by using NS2, depicts the efficiency of our proposed mechanism in packet delivery ratio under the presence of BlackHole nodes.

2016 ◽  
Vol 2016 ◽  
pp. 1-8 ◽  
Author(s):  
Elham Zamani ◽  
Mohammadreza Soltanaghaei

Mobile ad hoc network (MANET) is one of the most widely used networks, which has attracted attentions, having features such as limited energy resources, limited bandwidth, and security weaknesses due to lack of a central infrastructure. Safe and suitable routing is one of the research aspects of MANET. In this paper, a proposed method, called M-AODV, which is a type of overhearing backup protocol, based on AODV, is presented. The simulation results of this protocol, applied by NS2 simulator, showed the improvement of packet delivery rate and reduction of overhead and delay. Moreover, to assess the security of the proposed protocol, we simulated M-AODV and AODV protocols under black hole and wormhole attacks, using no security solution. The results showed that M-AODV had been improved in terms of packet delivery ratio, and the delay had been reduced as well, but the amount of overhead had been increased.


Now a day’s mobile ad-hoc network (MANET) is engaged by numerous scientists and endeavoring to be conveyed by and by. To accomplish this objective, these two components are a significant issue that we need to consider. The first is "overhead". As it were, messages that is not important to be sent when setting up a system association between versatile hubs. The following issue is the parcel sending rate from source to the goal hub that sufficiently high to ensure a successful system association. This paper is concentrating on improving the exhibition of the Location-Aided Routing Protocol (LAR) regarding overhead decrease by adjusting the calculation of the MANET course disclosure process. The consequence of the reproduction shows that the proposed convention can decrease overhead definitely, growing system lifetime and increment parcel sending rate while contrasting and other traditional conventions.


Author(s):  
Rajendra Prasad P ◽  
Shiva Shankar

Introduction: The aim of the securing energy routing protocol, is to provide the countermeasures to the attacks par-ticularly to the black hole in mobile ad-hoc network, and enhancing the network performance metric throughput al-so reducing the end-to-end delay between the nodes in the network.To build the protocol that enhances the perfor-mance of the network by modifying the existing DSR protocol by introducing new route discovery mechanism in the proposed protocol. Method: The proposed protocol implementation has two phases, route request/reply phase and route confirm phas-es. During the route discovery process, the route discovery from the source to destination process are described by sending the RREQ packet from the source hub as shown in Fig. 1(a), when it does not have one accessible and crav-ings a route to a destination. The source node transmits the RREQ to its associate nodes and the destination node re-ply with RREP. When the source receives reply message, the source node respond with reverse path with a confirm RCON message and providing security to the nodes in the network. Results: To verify the performance of the proposed protocol against the existing DSR protocol are compared with respect to various network metrics like end-to-end delay and packet delivery ratio and validated the result by com-paring both routing algorithm using Network Simulator 2. Conclusion: The results of the proposed SERP strongly safeguard against the attacks in the network and the packet delivery ratio is increased compared with the DSR also the end-to-end delay is reduced in the proposed protocol. Discussion: Mobile ad-hoc networks are being dynamic in nature, it associates with issues relating to secure routing, energy and are generally vulnerable to several types of attacks. The DSR is one of the widely used reactive proto-cols available for the mobile ad-hoc network and the proposed work enhancing the security of the network in the existing pro


Author(s):  
Ajay Vyas ◽  
Margam Suthar

Mobility models are used to evaluated the network protocols of the ad hoc network using the simulation. The random waypoint model is a model for mobility which is usually used for performance evaluation of ad-hoc mobile network. Mobile nodes have the dynamic mobility in the ad hoc network so the mobility model plays an important role to evaluate the protocol performance.In this article, we developed modify random waypoint mobility (MRWM) model based on random waypoint for the mobile ad hoc network. In this article, the comparative analysis of modifying random waypoint mobility and random waypoint model on the ad hoc On-Demand Distance Vector (AODV) routing protocol has been done for large wireless ad hoc network (100 nodes) with the random mobile environment for the 1800s simulation time. To enhance the confidence on the protocol widespread simulations were accomplished under heavy traffic (i.e. 80 nodes) condition. The proposed model protocol has been investigated with the performance metrics: throughput; packet delivery ratio; packet dropping ratio; the end to end delay and normalized routing overhead. The obtained results revealed that proposed modify random waypoint mobility model reduces the mobility as compared to the random waypoint mobility model and it is trace is more realist.


2017 ◽  
Vol 1 (1) ◽  
pp. 47-50
Author(s):  
Marumo R. Okaile ◽  
Adedeji O. Sangodoyin ◽  
Ramajalwa P. Emma P. Ramajalwa ◽  
Moile Tshepo

Routing protocol selection are the primary ways to design any wireless network. In Mobile Ad-hoc Network (MANET), the chosen protocol ought to be the best in terms information delivery and data integrity. Hence, the performance analysis of the protocol is the major step before choosing a specific protocol. In this paper, the performance analysis is applied to Ad-Hoc On-Demand Distance Vector protocol using Network Simulator2. Packet delivery ratio and energy are the two common measures used for the comparison of the performance of above protocol.


Mobile Ad Hoc Network (MANET) is a highly popular wireless network technology due to the proliferation of wireless devices. The characteristic of mobile ad hoc network is described as wireless links and open medium, centralized decision making, dynamic topology, limited power supply, bandwidth constraint and no predefined boundary. Due to its unique characteristics, this technology has been used to support communications in situations where it may be impossible to deploy infrastructure networks, such as military battlefields, disaster recovery sites and medical emergency situations. However, they appear to be susceptible to a variety of attacks than any other networks. The nodes of a MANET communicate with each other with the help of intermediate nodes. Each node of a network act as a host as well as a router. Efficient routing protocols have been developed to support the functionality of each node. These protocols trust that all the nodes are cooperative and well behaved. But some nodes act as a malicious node and launch various attacks on routing protocols. Mainly sinkhole attack affects the routing functionality of the network. Therefore, route inference-based attack detection has been proposed to handle the sinkhole attack in the networks. The proposed system computes the weight value by considering route factor, flow factor and sink factor. Based on the weight value, a malicious node is identified. The experiment results indicate that, the proposed system achieved a packet delivery ratio of 99.6% and throughput of 2700 kbps.


Author(s):  
Navneet Kaur ◽  
Amandeep Verma

The network in which the nodes can enter or leave the network as per their need is known as mobile ad-hoc network. This is a self-configuring type of network and so the routing in this type of network is very difficult. Numerous routing protocols are involved here which are classified on the basis of their properties into reactive, proactive and hybrid protocols. There are several important parameters such as delay, packet loss and throughput. These parameters are utilized for checking the performance of three routing protocols namely AODV, DSR and DSDV within this research. In comparison to the other protocols, the AODV routing protocol provides better results. In order to provide efficient path establishment from source to destination, enhancement has been proposed here within the AODV protocol which includes the utilization of cuckoo search and bee colony named bio-inspired techniques in it. The nodes that are found to be common in the selected paths are chosen to be the best nodes for the path. The NS2 tool is used for performing the simulations. As per the results achieved it can be seen that the AODV protocol provides better results in terms of the above mentioned parameters.


Wireless and mobile computing enables the spontaneous networking of a system with or without previous set-up. Mobile Ad Hoc Network (MANET) is a Wi-Fi grid that has already been developed and does not require an existing infrastructure for a specific extemporaneous operation. Any node can then connect or exit the network, which will permit the attacker to access the whole system. These networks are liable to various attacks. This paper directs detection of the clone attack from MANETs in which the attacker node steals the id of the closing node, twin it and attracts all the data towards it. ACO noticed the clone attack and measured performance based on the packet drops, packet delivery ratio and network throughput.


Sign in / Sign up

Export Citation Format

Share Document