ANALYSIS OF BLACK HOLE ATTACK DURING ROUTE DISCOVERY PHASE OF AODV IN MANET
DOI:
https://doi.org/10.29121/ijetmr.v4.i11.2017.126Keywords:
AODV, Black hole Attack, MANET, NS-2.35Abstract
MANET (Mobile ad hoc networks) is a collection of wireless mobile nodes dynamically forming an infrastructure less network. Several routing protocols are designed for routing of packets in MANET. One of them is AODV (Ad hoc on demand Distance Vector) protocol whose performance is better for higher mobile nodes. It is more vulnerable to black hole attack by the malicious node. Black hole attack is a network layer attack in MANET that tries to hamper the routing process. During route discovery phase it sends false reply to the nodes and dropped data packets. In this paper, first we have implemented black hole attack in AODV and then analyzed the impact of black hole attack under deferent metrics like throughput, packet delivery ratio and packet loss. Simulator NS-2.35 is used for implementation and result analysis.
Downloads
References
C. E. Perkins, “The Ad Hoc On-Demand Distance-Vector Protocol (AODV)” Ad Hoc Networking, Addison-Wesley, pp. 173–219, 2001.
C. Perkins, E Royer and S. Das, “Ad hoc On-demand Distance Vector (AODV) Routing”, RFC 3561, July 2003. DOI: https://doi.org/10.17487/rfc3561
Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao, “A survey of black hole attacks in wireless mobile ad hoc networks”, Humancentric Computing and Information Sciences 2011, 1:4. DOI: https://doi.org/10.1186/2192-1962-1-4
Burbank JL, Chimento PF, Haberman BK, Kasch WT “Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology”. IEEE Communication Magazine 44(11):39–45, 2009. DOI: https://doi.org/10.1109/COM-M.2006.248156
Ei Ei Khin and Thandar Phyu, “IMPACT OF BLACK HOLE ATTACK ON AODV ROUTING PROTOCOL” International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014. DOI: https://doi.org/10.5121/ijitmc.2014.2202
Sushil Kumar, Deepak Singh Rana and Sushil Chandra Dimri, “Analysis and Implementation of AODV Routing Protocol against Black Hole Attack in MANET” International Journal of Computer Applications (0975 - 8887) Volume 124 - No.1, August 2015. DOI: https://doi.org/10.5120/ijca2015905301
C. E. Perkins, E. M. Belding-Royer, and S. R. Das, “Ad Hoc On-Demand Distance Vector (AODV) Routing,” IETF RFC 3561, July 2003. DOI: https://doi.org/10.17487/rfc3561
Semih Dokurer, Y.M. Erten, Can Erkin Acar, “Performance Analysis of Ad-hoc Networks under Black Hole Attacks”, in: Proc. of the IEEE SoutheastCon, pp. 148-153, 2007. DOI: https://doi.org/10.1109/SECON.2007.342872
Downloads
Published
How to Cite
Issue
Section
License
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section