Research Article

Quantitative Detection of AODV against Black Hole and Worm Hole Attacks in MANET

by  Neha Malhotra, Rachit Garg, Rajiv Mahajan
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Issue 11
Published: April 2013
Authors: Neha Malhotra, Rachit Garg, Rajiv Mahajan
10.5120/11626-7097
PDF

Neha Malhotra, Rachit Garg, Rajiv Mahajan . Quantitative Detection of AODV against Black Hole and Worm Hole Attacks in MANET. International Journal of Computer Applications. 68, 11 (April 2013), 42-48. DOI=10.5120/11626-7097

                        @article{ 10.5120/11626-7097,
                        author  = { Neha Malhotra,Rachit Garg,Rajiv Mahajan },
                        title   = { Quantitative Detection of AODV against Black Hole and Worm Hole Attacks in MANET },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 68 },
                        number  = { 11 },
                        pages   = { 42-48 },
                        doi     = { 10.5120/11626-7097 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Neha Malhotra
                        %A Rachit Garg
                        %A Rajiv Mahajan
                        %T Quantitative Detection of AODV against Black Hole and Worm Hole Attacks in MANET%T 
                        %J International Journal of Computer Applications
                        %V 68
                        %N 11
                        %P 42-48
                        %R 10.5120/11626-7097
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is very essential in both wired and wireless network communication. An ad hoc network is a collection of number of wireless computers having dynamically changing topology due to which the security issues are more in case of wireless networks. In this paper the aim is to provide a quantitative analysis of all the security challenges that effect the performance of MANET protocols by analyzing the effects on AODV ( Ad hoc on demand vector routing protocol). The current paper willexplain the concern of black hole, worm holeattacks and presents the impact on AODV routing protocol.

References
  • Agrawal, D. P. , "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol. 40, no. 10, pp. 70- 75, October 2002.
  • Bala, A. , Bansal, M. , and Singh, J. 2010. Performance Analysis of MANET under Blackhole Attack. First International Conference on Networks and Communications 141-145.
  • Bintu Kadhiwala and Harsh Shah, " Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-hoc Networks" International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS - 2012) Proceedings published in International Journal of Computer Applications® (IJCA) (0975 – 8887)
  • IrshadUllah and Shoaib Ur Rehman, Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols
  • Kute D. S. , Patil A. S. , Pardakhe N. V. and Kathole A. B. , International Journal of Wireless Communication
  • Latha Tamilselvan, V. Sankaranarayanan, "Prevention of Co-operative Black Hole Attack in MANET", Journal of Networks, Vol 3, No 5, 13-20, May 2008
  • Madhusudhananagakumar KS, G. Aghila, "A Survey on Black Hole Attacks on AODV Protocol in MANET"International Journal of Computer Applications (0975 – 8887) Volume 34– No. 7, November 2011
  • M. , Yoo, S. and Park, S, "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional Conference, pp. 96-97, 2004.
  • Neha , Tarun Gupta, Rachit Garg," A Quantitative survey of mobile and ad hoc multicast routing protocols" International Journal of Emerging Technology and Advanced Engineering
  • N. Bhalaji, A. Shanmugam, "A Trust Based Model to Mitigate Black Hole Attacks in DSR Based MANET", European Journal of Scientific Research, Vol. 50 No. 1, pp. 6-15, 2011.
  • Nidhi Nigam and Vishal Sharma, "A Novel Approach for Wormhole Detection in MANET"International Journal of Computer Applications (0975 – 8887) Volume 63– No. 7, February 2013
  • Pratik Singh, Aman Dutta, Flood Tolerant AODV Protocol (FT-AODV),International Journal of Computer Applications (0975 – 8887) Volume 53– No. 6, September 2012
  • Reshmi Maulik1 and Nabendu Chaki2, " A Study on Wormhole Attacks in MANET", International Journal of Computer Information Systems and Industrial Management Applications ISSN 2150-7988 Volume 3 (2011) pp. 271-279
  • Sharma, N. , and Sharma, A. 2012. The Black-hole node attack in MANET. Second International Conference on Advanced Computing and Communication Technologies 546-550.
  • Tamilselvan, L. ; Sankaranarayanan, V. , "Prevention of Blackhole Attack in MANET," Wireless Broadband and Ultra Wideband Communications, 2007. Aus Wireless 2007. The 2nd International Conference on, vol. , no. , pp. 21, 27-30 Aug. 2007.
  • Thind. T. , & Garg. R. , "Mobile distributed system: concepts, issues, challenges", National Conference on Emerging Trends in Computer Science & Engineering (ETCSE-2012) , 11th-12th May,2012, Guru Kashi University, Talwandi Sabo, Punjab, India
  • XiaoYang Zhang; Sekiya, Y. ; Wakahara, Y. , "Proposal of a method to detect black hole attack in MANET," Autonomous Decentralized Systems, 2009. ISADS '09. International Symposium on, vol. , no. , pp. 1-6, 23-25 March 2009
  • Y. -C. Hu, A. Perrig, D. B. Johnson. "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks", Wireless Networks, 11(1-2), pp. 21–38, 2005.
  • NitalMistry, Devesh C Jinwala, Member, IAENG, MukeshZaveri"Improving AODV Protocol against Blackhole Attacks"
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Ad hoc network protocol AODV black hole worm hole wireless network packets

Powered by PhDFocusTM