For Queries/Clarification

alameenpublications@gmail.com

e-ISSN 2455-9288

Why publish with

ijaser

IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.

MIGRATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOL

Abstract

Ad  hoc  On  Demand  Vector  (AODV)  is  a reactive routing protocol in Mobile Ad hoc Network (MANET). Although the protocol has  been  around  for  quite  some  time,  but there  is  still  security  issue which  made  it vulnerable to various attacks such as black hole       which    tremendously       affects

the network   performance.   There   have   been several works done to mitigate this problem but

most of the proposed methods introduce overhead to the existing protocol i.e. extra control messages. Most of MANET devices are resource constraint and therefore a light solution is needed. For this reason, in this paper we proposed a method called ERDA (Enhance Route Discovery for AODV). The proposed method  is  able  to  mitigate  the aforesaid problem             by          introducing          new conditions   in the   routing   table   update process and also by adding simple malicious node detection and isolation process to the AODV   route  discovery  mechanism.   The proposed  method  does  not  introduce  any additional control message and moreover, it does   not   change   the   existing   protocol scheme.   In

order   to   test   the   proposed method, a simulation model was developed. The   simulation   results   show significant improvement  to  the  network  performance after ERDA is implemented in the AODV as compared to the existing AODV protocol.

Author

Mr.R.THOUFIK AHAMED, P.DAMODARAN
Download

1.       Perkin, C.E., Royer, E.M.:  Ad-hoc   on demand distance vector routing.

 

In:  Proceedings   of  2nd  IEEE  Workshop   on  Mobile  Computer   Systems   and  Applications,   New

Orleans(1999).

 

 

2.      Abolhasan,  M.,  Wysocki,  T.,  Dutkiewicz,  E.:  A  review  of  routing  protocols  for  mobile  ad  hoc networks. Elsevier, Amsterdam (2004).

 

 

3.      Mahmood,  R.A.,  Khan,  A.I.:  A Survey on Detecting Black Hole Attack in AODV- based Mobile Ad Hoc Networks. In: International Symposium on High Capacity Optical Networks and Enabling Technologies (2007).

 

 

4.      Perkin,  C.E.:  Ad  hoc  On  Demand  Distance  Vector  (AODV)  Routing.  Internet  draft,  draft-ietf- manetaodv-02.txt (November1988).

 

 

5.      Kumar,  V.:  Simulation  and  Comparison  of AODV and DSR Routing Protocols in MANETs, Master

Thesis (2009).

 

 

6.      Xing,  F.,Wang, W.:  Understanding Dynamic Denial of Service Attacks in Mobile Ad hoc Networks.

In: IEEE Military Communication 2006.

 

 

7.             Kandwal,  Algorithm  for Detection and Prevention  of Cooperative  Black and GrayHoleAttacks  in

Mobile Ad Hoc Networks, International        Journal  ofComputer Applications Volume 1 (2010).

 

 

8.           Abderrahmane     Baadache,     Ali     Belmehdi, Avoiding  Black  hole  and  Cooperative  Black hole Attacks in Wireless Ad hoc Networks (IJCSIS)  International Journal of Computer Science  and  Information Security,  Vol.  7, No. 1, 2010.

 

 

9.       E.  A  .Mary  Anita,  V.  Vasudevan,  BlackHole Attack Prevention in Multicast Routing

 

Protocols  for Mobile  Ad  hoc  networks  using Certificate    Chaining,    International    Journal  of  Computer

Applications (0975 8887) Volume 1 No. 12 (2010).

 

 

10.         Suman Deswal and    Sukhbir     Singh,     Implementation     of    Routing     Security     Aspects     in

AODV,International           Journal      of  Computer  Theory  and  Engineering,  Vol.  2,  No.  1  February,

2010.

 

 

11.      Sanzgiti, K., Dahill,  B., Levine,  B.N., Shields, C., Elizabeth, M., Belding-Royer: A secure Routing Protocol    for  Adhoc networks. In: Proceedings of the 10th EEE International Conference on Network Protocols, ICNP 2002 (2002).

 

 

12.     Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure  Efficient  Distance  Vector  Routing for Mobile Wireless Ad hoc Networks. In: Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, pp. 3–13 (June 2002).


-->