Open Access   Article Go Back

Simulation Of Blackhole Nodes And Prevention Using IDS For MANET Reactive Routing Protocol AODV

Bhagyashree Thakur1 , Sharda Patel2 , Ashok Verma3 , Shivendu Dubey4

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-12 , Page no. 114-120, Dec-2014

Online published on Dec 31, 2014

Copyright © Bhagyashree Thakur, Sharda Patel, Ashok Verma , Shivendu Dubey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Bhagyashree Thakur, Sharda Patel, Ashok Verma , Shivendu Dubey, “Simulation Of Blackhole Nodes And Prevention Using IDS For MANET Reactive Routing Protocol AODV,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.114-120, 2014.

MLA Style Citation: Bhagyashree Thakur, Sharda Patel, Ashok Verma , Shivendu Dubey "Simulation Of Blackhole Nodes And Prevention Using IDS For MANET Reactive Routing Protocol AODV." International Journal of Computer Sciences and Engineering 2.12 (2014): 114-120.

APA Style Citation: Bhagyashree Thakur, Sharda Patel, Ashok Verma , Shivendu Dubey, (2014). Simulation Of Blackhole Nodes And Prevention Using IDS For MANET Reactive Routing Protocol AODV. International Journal of Computer Sciences and Engineering, 2(12), 114-120.

BibTex Style Citation:
@article{Thakur_2014,
author = {Bhagyashree Thakur, Sharda Patel, Ashok Verma , Shivendu Dubey},
title = {Simulation Of Blackhole Nodes And Prevention Using IDS For MANET Reactive Routing Protocol AODV},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {114-120},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=346},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=346
TI - Simulation Of Blackhole Nodes And Prevention Using IDS For MANET Reactive Routing Protocol AODV
T2 - International Journal of Computer Sciences and Engineering
AU - Bhagyashree Thakur, Sharda Patel, Ashok Verma , Shivendu Dubey
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 114-120
IS - 12
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3337 3279 downloads 3617 downloads
  
  
           

Abstract

Mobile ad hoc networks (MANET) are widely used in that places where there is no available infrastructure. It is also called infrastructure less network. It is a collection of mobile nodes that dynamically form a temporary network without infrastructure. Each mobile node can move freely in any direction and changes their links to other devices frequently. In MANET different types of routing protocols have been recommended. Ad hoc On demand Distance Vector (AODV) is one of the most suitable routing protocol for the MANETs and it is more vulnerable to black hole attack by the malicious nodes. In this attack, the malicious node advertises itself as having the shortest path to the destination and falsely replies to the route requests, and drops all receiving packets. In this paper, we have surveyed and compare the existing solutions to multiple black hole attacks on AODV protocol and their drawbacks.

Key-Words / Index Term

MANET, AODV, DRS, OLSR, DSDV

References

[1] Pooja Jaiswal, Dr. Rakesh Kumar “Prevention of Black Hole Attack in MANET”, IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 Vol.2, No5, October 2012.Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
[2] Y. Khamayseh, A. , Bader, W. Mardini and M. BaniYasein, “A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks “International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3, No. 1, April 2011.
[3] Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei Kato; “A SURVEY OF ROUTING ATTACKS IN MOBILE AD HOC NETWORKS”, IEEE Wireless Communications • October 2007. PP: 85-90.
[4] Pooja Vinod Kumar Department of Computer Science and Applications”A Review on Detection of Blackhole Attack Techniques in MANET” Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering.
[5] “ Modified AODV Protocol against Black hole Attacks in MANET” by K. Lakshmi1, S.Manju Priya, A.Jeevarathinam, K.Rama, K.Thilagam
[6] Ming-Yang Su; Kun-Lin Chiang; Wei-Cheng Liao, "Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks," Parallel and Distributed Processing with Applications (ISPA), 2010 International Symposium on, vol., no., pp.162-167, 6-9 Sept. 2010
[7] Jaspal Kumar, M. Kulkarni, Panipat Institute of Engineering & Technology, India National Institute of Technology, Karnataka, India “Effect of Black Hole Attack on MANET Routing Protocols” I. J. Computer Network and Information Security, 2013, 5, 64-72 Published Online April 2013 in MECS
[8] C. Kim, E. Talipov and B. Ahn, "A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks," Pro- ceeding from EUC'06: The 2006 International Confer- ence on Emerging Directions in Embedded and Ubiqui- tous Computing, Seoul, 1-4 August 2006, pp. 522-531.
[9] Ravi KantvM.tech ScholarvABES EC, Ghaziabad” A Literature Survey on Black Hole Attacks on AODV Protocol in MANET” International Journal of Computer Applications (0975 – 8887) Volume 80 – No 16, October 2013
[10] S. Dokurer, Y. M. Erten and E. A. Can, "Performance Analysis of Ad-Hoc Networks under Black Hole Attacks," Proceeding from SECON'07: IEEE Southeast Conference, Richmond, 22-25 March 2007, pp. 148-153.
[11] K. Makki, N. Pissinou, and H. Huang, “Solutions to the black hole problem in mobile ad-hoc network,” 5th World Wireless Congress, pp.508–512, 2004.Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
[12] S. Lu, L. Li, K.Y. Lam, L. Jia, “SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.,” International Conference on Computational Intelligence and Security, 2009.
[13] Bhoomika Patel Department of Information Technology, Parul Institute of Engineering & Technology, Limda,Vadodara, India.” A Review - Prevention and Detection of Black Hole Attack in AODV based on MANET” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014,
[14] Nirali Modi, Vinit Kumar Gupta Department of computer engineering Hasmukh Goswami College of Engineering, Ahmedabad, India” Prevention Of Black hole Attack using AODV Routing Protocol in MANET” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014,
[15] Neha Kaushik, M.Tech Student Ajay Dureja, Assistant Prof. PDM College of Engineering for Women, B’Garh” Performance Evaluation Of Modified Aodv Against Black Hole Attack In Manet” European Scientific Journal June 2013 edition vol.9, No.18