IJCNIS Vol. 5, No. 12, 8 Oct. 2013
Cover page and Table of Contents: PDF (size: 306KB)
Full Text (PDF, 306KB), PP.35-44
Views: 0 Downloads: 0
MANET, AODV, Blackhole Attack, Security
Mobile Adhoc NETwork (MANET) consists of mobile nodes that can move freely and route packets without aid of centralized infrastructure. Dynamic changing topology, limited battery power and lack of centralized trusted authority make it vulnerable to several attacks and lot of research is being carried out in the field of security by discovering attacks, evaluating the damage caused to the network and developing solutions to combat such attacks. This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously. The analysis guides us to the various performance parameters such as throughput, packet delivery fraction, normalized routing load and number of dropped packets evaluated over different scenarios.
Tarunpreet Bhatia, A.K. Verma, "Performance Evaluation of AODV under Blackhole Attack", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.12, pp.35-44, 2013. DOI:10.5815/ijcnis.2013.12.05
[1]M. Bouhorma, H. Bentaouit and A. Boudhir, "Performance Comparison of Ad-hoc Routing Protocols AODV and DSR," Proc. IEEE, International Conference on Multimedia Computing and Systems (ICMCS'09), April 2009, pp. 511-514.
[2]S. Gupte and M. Singhal, "Secure routing in mobile wireless ad hoc networks," Ad hoc networks, Elsevier, vol. 1, no. 1, pp.152-174, 2003.
[3]I. Aad, J.-P. Hubaux and E. W. Knightly, "Impact of Denial of Service Attacks on Ad Hoc Networks," IEEE/ACM Transactions on Networking, vol. 16, no. 4, pp. 791-802, 2008.
[4]O. Adaobi, E. Igbesoko and M. Ghassemian, "Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organized Networks," IEEE conference On New Technologies, Mobility and Security (NTMS), May 2012, pp. 1- 5.
[5]V. Daza, J. Herranz, P. Morillo and C. Rafols, "Cryptographic techniques for mobile ad-hoc networks," Computer Networks, Elseveir, vol. 51, no. 18, pp. 4938-4950, 2007.
[6]Y. C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," In Eighth Annual International Conference on Mobile Computing and Networking (Mobi-Com 2002), Atlanta, GA, USA, September 2002, pp. 12-23.
[7]D. B. Johnson, D. A. Maltz, and Y. C. Hu, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," IETF Internet Draft, draft-ietf-manet-dsr-10, accessed on 20 Jan 2013.
[8]K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields and E. M. B. Royer, "Authenticated routing for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, pp. 598-610, 2005.
[9]Y. C. Hu, D. B. Johnson and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks" In the 4th IEEE Workshop on Mobile Computing Systems & Applications, 2002, pp. 3-13.
[10]M. G. Zapata, "Secure Ad Hoc on-demand Distance Vector (SAODV) Routing," IETF Internet Draft,draft-guerrero-manet-saodv-03, 2005, accessed on 20 Jan 2013.
[11]D. Djenouri, L. Khelladi and N. Badache, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks," IEEE Commun. Surveys and Tutorials, vol. 7, no. 4, pp. 2-28, 2005.
[12]H. L. Nguyen, "A study of different types of attacks on multicast in mobile ad hoc networks," Ad Hoc Networks, Elsevier, vol. 6, no. 1, pp. 32-46, 2006.
[13]Usha and Bose, "Understanding Black Hole Attack in Manet," European Journal of Scientific Research, vol. 83, no. 3, pp. 383-396, 2012.
[14]C. Perkins, E. Royer, and S. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing," IETF, RFC 3561, 2003, accessed on 10 Jan 2013.
[15]D. Chakeres, E.M. Belding-Royer, "AODV routing protocol implementation design," Proc. Of 24th International Conference on Distributed Computing Systems Workshops- W7: EC (ICDCSW'04), March 2004, vol. 7, pp. 698-703.
[16]K. Fall and K. Varadhan (Eds.), ns notes and documentation, 1999 accessed on 24 Dec, 2012.
[17]T. Issariyakul, E. Hossain, "Introduction to Network Simulator NS2," Springer, US, 2009.
[18]P. Bakalis and B. Lawal, "Performance Evaluation of CBR and TCP Traffic Models on MANET Using DSR Routing Protocol," International Conference on Communications and Mobile Computing (CMC), April 2010, vol. 3, pp. 318-322.
[19]W. Navidi and T. Camp, "Stationary distributions for the random waypoint mobility model," IEEE Transaction. Mobile Computing, vol.3, no.1, pp. 99-108, Jan-Feb 2004.
[20]F. J. Ros and P. M. Ruiz, "Implementing a New Manet Unicast Routing Protocol in NS2," December, 2004, [Online] Available: http://masimum.dif.um.es/nsrt-howto/pdf/nsrthowto.pdf accessed on Dec 29, 2012.
[21]A.U. Salleh, Z. Ishak, N. M. Din, and M. Z. Jamaludin, "Trace Analyzer for NS-2," IEEE, Student Conference on Research and Development (SCOReD), Malaysia, June 2006, pp. 29-32.
[22]I. K. Tabash, N. Ahmad and S. Beg, "Performance Evaluation of TCP Reno and Vegas over different routing protocols for MANETs," IEEE 4th International Symposium on Advanced Networks and Telecommunication Systems (ANTS), Dec. 2010, pp. 82-84.