Modification in AODV for preventing Black hole Attack and increasing energy efficiency

  • Ruchi Kumari university of pune
  • Nishi Yadav
Keywords: MANET, AODV, blackhole attack

Abstract

 Mobile Ad-hoc Network or MANET is basically a collection of mobile nodes. It is connected in a dynamic manner that is it has the property to change according to changing topology due to the lack of centralized nodes. Nodes are free to move about arbitrarily. This leads to difficult task of route maintenance in MANET. Nodes in MANET communicate with each other through various protocols. So, it is essential to identify which routing protocol works best for routing in MANET. For that we have analyzed most commonly used protocols viz AODV, DSR and DSDV on various parameters. We continue our study restricted to the AODV (Ad hoc On-demand Distance Vector) Routing protocol (since it is the most appropriate protocol for MANETs). The dynamic nature of MANET also poses a major problem for it. It is accessible to both legitimate user and attacker since it does not have a clear line of defense. A MANET becomes highly vulnerable to various attacks. The most common and prominent of all the attacks is Black Hole Attack. So we have to formulate a security solution to prevent the attacks. In order to do this, we have pre-identified all the malicious nodes in the network and then carry on routing so the network is not affected by malicious nodes and its performance not deteriorated by it. Also we make some improvements in physical nodes in order to improve the energy of nodes in the network

References

[1] Priyanka Goel, Sahil Batra and Ajit Singh, “Review of Security Attacks in Mobile Adhoc Network” ,Nov 2010. [2] Manjit Singh and Kamaljit Kaur, “Various Attacks in MANET and its Countermeasures”, April 2014. [3] Manjeet Singh and Gaganpreet Kaur, “A Survey of attacks in MANET”, June 2013 [4] Gurpinder Singh and Jaswinder Singh, “Issues and Behaviour of Routing Protocols in MANET”, April 2012. [5] Amit Shrivastava, Nitin Chander, Avinash Mistry, Prashanth Patlolla, “Overview of Routing Protocols in MANET and Enhancements in Reactive Protocols”, 2009. [6] Shraddha Raut and S.D. Chede, “Detection and Removal of Black Hole in Mobile Adhoc Network”, 2014. [7] E.A. Mary and H.J. Shanthi, “Performance Analysis of Black Hole Attacks in Geographical Routing MANET”, 2013. [8] Identification and Alleviation of MANET Routing Attack Risks by Dakshayani G and Amol P Pandey, July 2013. [9] Athira V Panicker and Disha G, “Network Layer Attacks and Protection in MANET”, 2014. [10] Arnab Banerjee and Dipayan Bose, “Different types of attacks in Mobile Adhoc Network: Prevention and Mitigation”, 2013. [11] Sobin on IEEE Risk Aware Mitigation for MANET Routing Attacks, August 2016. [12] Qing Fang, Jie Gao and Leonidas J Guibas, “Locating and Bypassing Holes in Mobile Network”, 2006. [13] Mohammad A. Mikki, International Journal of Computer Science and Information Security, “Energy Efficient Location Aided Routing for Wireless MANETs”, 2009. [14] Sushil Kumar, Dinesh Singh & Mridul Chawla “Performance Comparison of Routing Protocols in MANET Varying Network Size” [15] Nurul I. Sarkar & Wilford G. Lol “A Study ofMANET Routing Protocols: Joint Node Density, Packet Length and Mobility” 978-1- 4244-7755-5/10/$26.00 ©2010 IEEE Page no. 515-520 [16] Vasudha Arora & C. Rama Krishna “Performance Evaluation of Routing Protocols for MANETs under Different Traffic Conditions” 2010 2nd International Conference on Computer Engineering and Technology [Volume 6] 978-1- 4244-6349-7/10/$26.00 c 2010 IEEE [17] Ian D. Chakeres and Elizabeth M. Belding-Royer. AODV Routing Protocol Implementation Design. [18] Patel, B.; Srivastava, S.; , "Performance analysis of zone routing protocols in Mobile Ad Hoc Networks," Communications (NCC), 2010 National Conference on, vol.,pp.1-5, 29-31 Jan. 2010. [19] Toh,C.-K.;Delwar, M.; Allen,D.;"Evaluating the communication performance of an ad hoc wireless network," Wireless Communications, IEEE Transactions on , vol.1, no.3, pp.402-414, Jul 2008 [20] [8] NS-2, The ns Manual (formally known as NS Documentation) available at http: //www. isi.edu/nsnam/ns/doc [21] Mohammad Al-Shurman & Seong-Moo Yoo, Seungjin Park, (2004) “Black hole attack in mobile ad hoc networks”, Proceedings of the 42nd annual Southeast regional conference ACM-SE 42, pp. 96- 97. [22] Gaurav Sandhu & Moitreyee Dasgupta, (2010) “Impact of blackhole attack in MANET”, International Journal of Recent Trends in Engineering and Technology, Vol. 3, No. 2.
Published
2018-03-24
How to Cite
Kumari, R., & Yadav, N. (2018). Modification in AODV for preventing Black hole Attack and increasing energy efficiency. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 3(3). Retrieved from http://www.asianssr.org/index.php/ajct/article/view/242
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.