Open Access   Article Go Back

Detection and Prevention of Wormhole & Black Hole Attacks in MANET Using AODV Protocol: Review

R.Sharma 1 , R.Thakur 2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 386-389, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.386389

Online published on Aug 31, 2018

Copyright © R.Sharma, R.Thakur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R.Sharma, R.Thakur, “Detection and Prevention of Wormhole & Black Hole Attacks in MANET Using AODV Protocol: Review,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.386-389, 2018.

MLA Style Citation: R.Sharma, R.Thakur "Detection and Prevention of Wormhole & Black Hole Attacks in MANET Using AODV Protocol: Review." International Journal of Computer Sciences and Engineering 6.8 (2018): 386-389.

APA Style Citation: R.Sharma, R.Thakur, (2018). Detection and Prevention of Wormhole & Black Hole Attacks in MANET Using AODV Protocol: Review. International Journal of Computer Sciences and Engineering, 6(8), 386-389.

BibTex Style Citation:
@article{_2018,
author = {R.Sharma, R.Thakur},
title = {Detection and Prevention of Wormhole & Black Hole Attacks in MANET Using AODV Protocol: Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {386-389},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2706},
doi = {https://doi.org/10.26438/ijcse/v6i8.386389}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.386389}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2706
TI - Detection and Prevention of Wormhole & Black Hole Attacks in MANET Using AODV Protocol: Review
T2 - International Journal of Computer Sciences and Engineering
AU - R.Sharma, R.Thakur
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 386-389
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
416 244 downloads 245 downloads
  
  
           

Abstract

Mobile ad-hoc networks are the self-configuring mobile nodes which are connected through the wireless links with the decentralised networks. The nodes in MANET communicate with each other on the basis of mutual trust. Nodes dynamically form a temporary network and are protected using many firewalls and encryption software. But number of them is not sufficient and effective. So the main aim is to provide security services such as authentication, confidentiality, integrity, availability etc. to the mobile users. In this paper the effect of Black hole attack and Worm attack is analysed on the AODV routing protocol in MANET and prevention mechanism is presented to secure the network.

Key-Words / Index Term

MANET, Wormhole Attack, Collaborative black hole Attack, Security, AODV

References

[1] J. Gronkvist, A. Hansson, and M. Skold, “Evaluation of a Specification-Based Intrusion Detection System for AODV”. 2007.
[2] M. Abolhasan, T. Wysocki, and E. Dutkiewicz “A review of routing protocols for mobile ad hoc networks.” Ad hoc networks, Vol.2 (1):pp.1–22, 2004.
[3] Kaur, Er. Sandeep Kaur Dhanda, “Analyzing the effect of Wormhole Attack on Routing Protocol in Wireless Sensor Network”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013.
[4] B. Bharagava, R. Oliveria, Y. Zhang and N. C. Idika, “ Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks,” In Proc. of 2009 29th IEEE Int. Conf. on Distributed Computing Systems Workshops, pp. 447-450, 2009.
[5] C.E. Perkins and E.M. Royer. “Ad-hoc on-demand distance vector routing”. In Second IEEE Workshop on Mobile Computing System and Application, WMCSA 99, pages 90 –100, Feb. 1999.
[6] Lui K.-S., sChiu H.S., “DelPHI: Wormhole Detection mechanism for Adhoc Wireless Networks” Proceedings of the 1st International Symposium on Wireless Pervasive Computing; Phuket, Thailand. 16–18 January 2006.
[7] Viren Mahajan, Maitreya Natu, and Adarshpal Sethi, “Analysis of wormhole Intrusion Attacks In MANETS”,IEEE Military Communications Conference,MILCOM. Nov 2008.
[8] Rashid Hafeez Khokhar, Md Asri Ngadi and Satira Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, Volume-2 Issue-3 pp. 18-29, , 2009.
[9] C. E. Perkins and E. M. Royer, “Ad Hoc On-Demand Distance Vector Routing,” In Proc. Of IEEEWorkshop on Mobile Comp. Sys.and Apps. Feb. 1999, pp. 90–100.
[10] S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, “Prevention of Cooperative Blackhole Attack in Wireless Ad Hoc Networks,” In Proc. of 2003 Int. Conf. on Wireless Networks, ICWN’03, Las Vegas, Nevada, USA, 2003, pp. 570–575.
[11] Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, j., and Nygard, K.“Prevention of cooperative black hole attack in wireless ad hoc networks”. In Proceedings of the International Conference on Wireless Networks, 2003
[12] H. Weerasinghe and H. Fu. “Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking” (fgcn 2007), volume 2, pages 362–367. IEEE, 2007.
[13] A. Baadache and A. Belmehdi.”Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks.” Arxiv preprint arXiv: 1002.1681, 2010.
[14] D. Eastlake and P. Jones, “Us secure hash algorithm 1 (sha1),” 2001.
[15] Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Packet Leashes: A Defence against Wormhole Attacks in Wireless Ad Hoc Networks”, IEEE 2003.