scholarly journals Anti-Black Hole Attack Mechanism for Ad Hoc On-Demand Distance Vector (AODV) Routing Protocol in Manets

2016 ◽  
Vol 135 (11) ◽  
pp. 37-45
Author(s):  
Fawaz Mahiuob ◽  
Khalid Saeed
2020 ◽  
Vol 12 (2) ◽  
pp. 25-46
Author(s):  
T. Aditya Sai Srinivas ◽  
S S Mani Manivannan

Workers or labors who are working in construction sites are prone to severe risks such as death, injuries happened due to accidents, falls and stuck in between objects. Internet of things (IoT) based sensors can be utilized to monitor the behavior of workers when they are in danger zones/areas. To safeguard site workers, supervisors or site managers should monitor and alert them when they are in danger. Data will be routed from site worker to supervisor, during this routing process data is subjected to routing attacks such as black hole attack and so on, due to wireless transmission. This article addresses the problem of black hole attack that happens during the wireless transmission between nodes and the base station (BS) of IoT-based civil construction. The proposed solution Collaborative Black Hole Attack – Ad Hoc On-Demand Distance Vector routing protocol (CBHA-AODV) prevents the collaborative black hole attack by 87.72%.


Author(s):  
Ali Ayid Ahmad ◽  
Ahmed Chalak Shakir

Mobile Ad Hoc Network is an infrastructure less wireless network where the mobile nodes leaves and joins the mobile network very frequently. The routing of the packets from source node to destination node, the routing protocol is used. On Demand Distance Vector Routing protocol is very common and implemented with Mobile Ad Hoc Network nodes to handle the operations of packet routing from by any node as a source node to destination node. In this paper prevention of black hole attack by modifying the On Demand Distance Vector routing protocol. The sequence number of 32 bit is initiated with the Route Reply and route sequence packet broadcast to determine the request reply from black hole node under the Mobile Ad Hoc Network. The sequence number and On demand Distance Vector Routing protocol are integrated with a mechanism to find the Request Reply of message containing routing information from source to destination node in Mobile Ad Hoc Network.


2020 ◽  
Vol 4 (1) ◽  
pp. 77-81
Author(s):  
Ghassan A. Qasmarrogy ◽  
Yazen S. Almashhadani

It is important to connect wirelessly a group of moving mobile nodes together in a static or dynamic form, to transfer digital data between them, this form known as a mobile ad hoc network. This private network can be used in different essential situations where it depends on each connected mobile node to deliver and pass the data between them, without any fixed access point or router. Unfortunately, there are different types of attacks that can affect these nodes, and steal or corrupt the data inside, one of these attacks called the black hole attack. In this paper, a compared study will be done between two major innovative techniques derived from the ad hoc on-demand distance vector routing protocol to avoid the black hole attack; the paper will compare the two techniques in delay, throughput and packet dropping efficacy.


Ad-hoc network is vulnerable to different types of attacks because of its vigorously changing topology, limited storage capacity, absence of centralized infrastructure etc. Adhoc On Demand Distance Vector (AODV) is established protocol for routing for this type of networks. AODV is exposed to black hole attack due to the inadequacy of security consideration. The malicious nodes drop all information packets rather than sending it to the neighboring node. In this research paper, Anomaly based intrusion detection system (IDS) known as Particle swarm optimization (PSO) is purposefully utilized to detect the misbehavior activities in the network. In AODV routing protocol, swarm agents are used for identifying misbehavior activities of nodes based on dropping behavior of data packets. An intrusion response system (IRS) is activated after the detection of an intrusion. It is necessary to take action against black hole attack or reduce the effect of the damage caused by the attack. IDS and a response system are integrated for detection and removal of the source of an attack respectively. The guard nodes are placed in the network with the aim to oppose black hole attackers and in this way IR is initiated. The malevolent nodes detected by PSO are bypassed and new routing paths are established using guard nodes. This research has been carried out for analyzing the influence of malicious nodes and guard nodes on varying network size vice versa. The simulation study of proposed technique integrated particle swarm optimization intrusion detection response system (IPSO-IDRS) explains how it is better in terms of the performance metric like throughput and PDR.


Vehicular ad hoc networks (VANETs) are upcoming prominent technology in the field of communication with vehicles. It is a combination of mobile and sensor network features. The random change in position of vehicles in VANET made the system more vulnerable to attacks. The most important attack in VANETs to be considered is Black hole attack which increases the chances for packet loss and in turn to accidents. There is a necessity to develop the techniques to detect Black hole attacks and reduce number of accidents. In this paper, a technique called “Detection of Black hole in VANET using AODV (DBVANETuAODV)” is proposed to find and prevent Black hole attack and thereby reducing occurrence of accidents. The proposed solution is implemented using AODV Routing protocol in VANET.The experiments are conducted with SUMO and NS2 simulators to depict network environment in an inexpensive way. The proposed method “DBVANETuAODV” is compared with AODV with black hole and the result shows the proposed method provides a significant improvement.


Sign in / Sign up

Export Citation Format

Share Document