Black Hole Detection in MANET Using AODV Routing Protocol

نویسندگان

  • Govind Sharma
  • Manish Gupta
چکیده

Mobile Ad-hoc network (MANET) has become an individual part for communication for mobile device. Therefore, interest in research of Mobile Ad-hoc network has been growing since last few years. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared to wired network or infrastructure-based wireless network. In this paper, we analyze the black hole attack. In this attack, a malicious node falsely advertise shortest path to the destination node. The intension of malicious node could be to intercept all data packets being sent to the destination node concerned. We proposed our approach to detect the black hole attack in Mobile Ad-hoc network. This approach is based on the AODV (ad-hoc on demand distance vector) routing algorithm. In this paper we are enhancing the secured AODV routing algorithm. Here we are making more secure AODV routing algorithm and using promiscuous mode of the node in promiscuous mode node can learn about the neighbouring routes traversed by data packets if operated in the promiscuous mode. Keywords— Secured Routing, AODV, Ad-hoc network, Black Hole Attack, Malicious node,MANET.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Black Hole Effect Analysis and Prevention through IDS in MANET Environment

In Mobile Wireless Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. It must discover its local neighbors and through them it will communicate to nodes that are out of its transmission range. Various features like open medium, dynamic topology, lack of clear lines of defense, makes MANET vulnerable to security attacks. Ad hoc on...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

A secure cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET

In this paper, a secure cross-layer–based routing technique (SCLARDI) for a mobile ad hoc network (MANET) is proposed. This technique makes use of ad hoc on-demand routing protocol (AODV) algorithms and honeypot technology to detect and isolate black hole attacks from MANETs. This novel system is compared with the single-layer design techniques and existing cross-layer detection techniques. Out...

متن کامل

A Survey on Security Solutions of AODV Routing Protocol against Black Hole Attack in MANET

Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing features AODV has gained popularity compared to other routing protocols, but this protocol lacks a security features which make it more vulnerable to malicious attack particularly black hole attack. A single or cooperate black hole attacks wh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012