Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc Networks

被引:0
|
作者
Yerneni, Rajesh [1 ]
Sarje, Ani K. [1 ]
机构
[1] Indian Inst Technol, Dept Elect & Comp Engn, Roorkee, Uttar Pradesh, India
关键词
Ad hoc netwoork; Routing protocols; Black hole attack; Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc Networks are self maintainable, dynamic and temporary networks. But they are vulnerable to various security attacks. Black hole attack is one of them. Black hole attacker attacks reactive routing protocols and disrupt routing services leading to drop in packet delivery percentage. Ad hoc On-demand Distance Vector routing (AODV) is a widely adopted network routing protocol for Mobile Ad hoc Network (MANET). To mitigate black hole attack, we propose modifications to the AODV protocol and justify the solution with appropriate implementation and simulation using NS-2.34. The proposed protocol makes use of the numb er of Route request and Rout e replies forwarded by the nodes to detect the attack. Our analysis show that modified protocol improves packet delivery ratio even in presence of attack
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks
    Singh, Dilraj
    Singh, Amardeep
    FUTURE INTERNET, 2015, 7 (03): : 342 - 362
  • [2] Modified AODV Protocol to Prevent Black Hole Attack in Mobile Ad-hoc Network
    Sharma, Romina
    Shrivastava, Rajesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (03): : 121 - 124
  • [3] A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks
    Mahmood, R. A. Raja
    Khan, A. I.
    2007 INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES, 2007, : 122 - 127
  • [4] Mitigating the Effects of Black hole Attacks on AODV Routing Protocol in Mobile Ad Hoc Networks
    Jain, Ashish Kumar
    Tokekar, Vrinda
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [5] Securing Data from Black Hole Attack Using AODV Routing for Mobile Ad Hoc Networks
    Kamatchi, V.
    Mukesh, Rajeswari
    Rajakumar
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 365 - 373
  • [6] Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol
    Geetha, K.
    Sreenath, N.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (03) : 1161 - 1172
  • [7] A Mechanism for Discovery and Prevention of Coopeartive Black hole attack in Mobile Ad hoc Network Using AODV Protocol
    Singh, Harsh Pratap
    Singh, Rashmi
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [8] Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol
    K. Geetha
    N. Sreenath
    Arabian Journal for Science and Engineering, 2016, 41 : 1161 - 1172
  • [9] To Mitigate Black Hole Attack in AODV
    Kumar, Raushan
    Quyoom, Abdul
    Gouttam, Devki Nandan
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 307 - 311
  • [10] Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks
    Venu, Vasantha Sandhya
    Avula, Damodaram
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (06)