scispace - formally typeset
Proceedings ArticleDOI

Combat with Black hole attack in AODV routing protocol in MANET

Reads0
Chats0
TLDR
The Simulation's results show that the proposed protocol provides better security and also better performance in terms of packet delivery than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.
Abstract
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc on demand Distance Vector) protocol. The security of the AODV protocol is threaded by a particular type of attack called ‘Black Hole’ attack. In this attack a malicious node advertises itself as having the shortest path to the destination node. To combat with black hole attack, it is proposed to wait and check the replies from all the neighboring nodes to find a safe route but this approach suffers from high delay. In this paper, an approach is proposed to combat the Black hole attack by using negotiation with neighbors who claim to have a route to destination. the Simulation's results show that the proposed protocol provides better security and also better performance in terms of packet delivery than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.

read more

Citations
More filters
Journal ArticleDOI

Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures

TL;DR: In this article, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper.
Journal ArticleDOI

A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks

TL;DR: A survey of the main types of attack at the network layer, and a review of intrusion detection and protection mechanisms that have been proposed in the literature are presented.
Journal ArticleDOI

Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures.

TL;DR: In this article, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper.
Proceedings ArticleDOI

An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET

TL;DR: This paper proposes a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs by using promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network.
Journal ArticleDOI

A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability

TL;DR: Different possible nature of the nodes in the network that can lead to the different possible attacks are discussed and the different classification of the techniques are presented.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Proceedings ArticleDOI

Ariadne: a secure on-demand routing protocol for ad hoc networks

TL;DR: a secure on-demand routing protocol for ad hoc networks that can be used to connect ad-hoc networks to each other without disrupting existing networks.
Book ChapterDOI

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks

TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.