IJCNIS Vol. 5, No. 5, 8 Apr. 2013
Cover page and Table of Contents: PDF (size: 412KB)
Full Text (PDF, 412KB), PP.64-72
Views: 0 Downloads: 0
MANETs, Routing Protocols, Black hole attack, AODV, Improved AODV
Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure against attacks by the malicious nodes. In this paper we have analyzed the effects of Black hole attack on mobile ad hoc routing protocols. Mainly two protocols AODV and Improved AODV have been considered. Simulation has been performed on the basis of performance parameters and effect has been analyzed after adding Black-hole nodes in the network. Finally the results have been computed and compared to stumble on which protocol is least affected by these attacks.
Jaspal Kumar, M. Kulkarni, Daya Gupta, "Effect of Black Hole Attack on MANET Routing Protocols", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.5, pp.64-72, 2013. DOI:10.5815/ijcnis.2013.05.08
[1]Tamilselvan, L. and Sankaranarayanan, V., Prevention of Black hole attack in MANET. The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, 21-21, 2007.
[2]Dokurer, S.; Ert, Y.M.; and Acar, C.E., Performance analysis of ad hoc networks under Black hole attacks. Southeast Con, 2007, Proceedings IEEE, 148 – 153.
[3]C. E. Perkins; E. M. Belding-Royer; and S. R. Das (2003). Ad hoc on demand distance vector (AODV) routing. RFC 3561. The Internet Engineering Task Force, Network Working Group.
[4]Sheenu Sharma, Dr. Roopam Gupta," "Simulation Study of Black hole Attack in the Mobile Ad hoc Networks", November 2009.
[5]M. Abolhasan, T. Wysocki, E. Dutkiewicz, " A Review of Routing Protocols for Mobile Ad- Hoc Networks", Telecommunication and Information Research Institute University of Wollongong, Australia, June, 2003.
[6]Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani, "A Survey of Secure Mobile Ad Hoc Routing Protocols", IEEE Communications Surveys & Tutorials, Vol. 10, No. 4, Fourth Quarter 2008.
[7]N. Shanti, Lganesan and K. Ramar, "Study of Different Attacks on Multicast Mobile Ad-Hoc Network".
[8]M. Parsons and P. Ebinger, "Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks"
[9]H.L. Nguyen, U.T. Nguyen, "Study of Different Types of Attacks on Multicast in Mobile Ad-Hoc Networks," International Conference on Networking, Systems, Mobile Communications and Learning Technologies, Apr,2006
[10]Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto. "Detecting Black hole Attack on AODV based Mobile Ad-hoc networks by Dynamic Learning Method". International Journal of Network Security, Vol.5, No.3, PP.338– 346, Nov. 2007
[11]K. Biswas and Md. Liaqat Ali, "Security threats in Mobile Ad-Hoc Network", Master Thesis, Blekinge Institute of Technology" Sweden, 22nd March 2007
[12]G. A. Pegueno and J. R. Rivera, "Extension to MAC 802.11 for performance Improvement in MANET", Karlstads University, Sweden, December 2006.
[13]S. Lu, L. Li, K.Y. Lam, L. Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.," International Conference on Computational Intelligence and Security, 2009.
[14]S. Kurosawa et al., "Detecting Black hole Attack on AODV-Based Mobile Ad-Hoc Networks by Dynamic".
[15]ns-2, Network simulator, http://www.isi.edu/nsnam/ns.
[16]B. Dahill, B. N. Levine, E. Royer, and C. Shields, "A secure routing protocol for ad hoc networks," in Proceedings of the International Conference on Network Protocols (ICNP), pp. 78-87, 2002.
[17]Y. Hu, A. Perrig and D. Johnson, Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks, in Proceedings of ACM MOBICOM'02, 2002.
[18]Janne Lundberg, Routing Security in Ad Hoc Networks. Tik-110.501 Seminar on Network Security.
[19]Anuj K. Gupta, Harsh Sadawarti, "Secure Routing Techniques for MANETs", International Journal of Computer Theory and Engineering (IJCTE), ISSN: 1793-8201, Article No. 74, Vol.1 No. 4, pp. – 456-460, October 2009.
[20]Nital Mistry, Devesh C Jinwala, Mukesh Zaveri, "Improving AODV Protocol against Black hole Attacks", Proceedings of the international multi conference of engineer and computer science vol. 2, 2010.
[21]H.A. Esmaili, M.R. Khalili Shoja, Hossein gharaee, "Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator", World of Computer Science and Information Technology Journal (WCSIT), Vol. 1, No. 2, 49-52, 2011.
[22]Latha Tamilselvan and Dr. V Sankaranarayanan, "Prevention of Black hole Attack in MANET", The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, 0-7695-2842-2/07, 2007.
[23]Santhosh Krishna B V, Mrs.Vallikannu A.L , "Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism" International Journal of Scientific & Engineering Research, Vol. 1, Issue 3, ISSN 2229-5518, December-2010.
[24]Harris Simaremare and Riri Fitri Sari, "Performance Evaluation of AODV variants on DDOS, Blackhole and Malicious Attacks", IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.6, June 2011.
[25]Tracy Camp, Jeff Boleng and Vanessa Davies, "A survey of Mobility Models for Ad hoc Network Research", Wireless Communications and Mobile computing: A special issue on Ad hoc network Research, vol 2, No5, pp. 483-502, 2002.
[26]Tracy Camp, Jeff Boleng and V Davies, "A survey of Mobility Models for Ad Hoc Network Research", http://toilers.mines.edu last accessed on February 15, 2007.