Enhanced AODV Protocol for Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network

Authors

  • Sherin Hijazi The University of Jordan, Amman
  • Mahmoud Moshref The University of Jordan, Amman
  • Saleh Al-Sharaeh The University of Jordan, Amman

DOI:

https://doi.org/10.24297/ijct.v16i1.5728

Keywords:

AODV, DSR, Black hole attack, MANET, NS2

Abstract

Mobile Ad-hoc Network (MANET) is a kind of wireless network that has the most challenging network infrastructure. It is formed using the mobile nodes without any centralized administration from the security perspective and is a self-configuring fastest emerging wireless technology, each node on the MANET will act like a router which forwards the packets. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among a pair of nodes. Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (ADOV) is a reactive MANET routing protocols. Most of the attacks on MANETs are routing protocol attacks. Attacks on routing protocols, especially internal attacks will cause the damage to MANETs. Sinkhole and black hole attacks are a type of internal attack which is affected by attempting to draw all network traffic to malicious nodes that fake routing update and degrade the performance of the network. The black hole nodes should be detected from the network as early as possible via detection mechanism and should also guarantee the higher detection rate and less cross-over error rate. In this paper, we studied the characteristics of black hole attack and how it will affect the performance of the distance vector routing on demand routing protocol such as (ADOV) protocol, which recognizes the presence of black hole node from packet flow information between nodes and isolates it from the network via applying AODV protocol that one of popular routing protocol. We have evaluated the performance of the system using widely used simulator NS2, results prove the effectiveness of our prevention and detection method.

Downloads

Download data is not yet available.

References

[1] Charu Sharma, Jaspreet Kaur, "Simulative Analysis of AODV Routing Protocol Of MANET Using OPNET Modeler 14.0”, International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 03 | June-2015.
[2] C. Karlof, and D. Wagner, "Secure routing in sensor networks: attacks and countermeasures", Proceedings of the 1st IEEE Workshop on Sensor Network protocols and Applications, pp. 1-15, May 2003.
[3] DEVI. P, KANNAMMAL. A, “A PRAGMATIC APPROACH TO SECURE DSR PROTOCOL FROM SINKHOLE ATTACK IN AD HOC ENVIRONMENT", Journal of Theoretical and Applied Information Technology, 31st August 2014. Vol. 66 No.3
[4] Harshavardhan Kayarkar, “A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques”, International Journal of Advanced Networking and Application, Vol. 03, Issue 05, pp. 1338-1351, March-April, 2012.
[5] H. C. Tseng, B. J. Culpepper, "Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators", Computers & Security, vol.24, 561-570, 2005.
[6] H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks", IEEE Communications Magazine vol. 40 no. 10, pp. 70-75, Oct. 2002.
[7] Johnson DB, Maltz DA, Hu YC.The dynamic source routing protocol for the mobile ad-hoc network (DSR), IETF internet-draft (work in progress); July 2004.
[8] Kim, G., Han, Y. and Kim, S. (2010) ‘A cooperative sinkhole detection method for mobile ad hoc networks’, AEU – International Journal of Electronics and Communications, Vol. 64, No. 5, pp.390–397, Elsevier
[9] Marchang, N., and Datta, R. (2008) ‘Collaborative techniques for intrusion detection in mobile ad-hoc networks', Ad Hoc Networks, Vol. 6, No. 4, pp.508–523, Elsevier.
[10] Mohammed Ashfaq Hussain, Dr. A. Francis Saviour Devaraj, “Upshot of Sinkhole Attack in DSR Routing Protocol Based MANET”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.1737-1741.
[11] Perkins CE, Royer EM, Das SR. Ad-hoc on-demand distance vector (AODV) routing, IETF internet draft. MANET Working Group
[12] P.G. Argyroudis and D. O'Mahony, "Secure Routing for mobile ad hoc networks", IEEE Communications Surveys & Tutorials, third quarter 2005, Vol. 7, no3, 2005 258 Authorized licensed use limited to University of Allahabad.
[13] P. Papadimitratos and Z. Haas, "Securing the Internet routing infrastructure", IEEE Communications Magazine, vol. 40, no. 10, pp 60-68, Oct 2002.
[14] Rajeshwar L. Balla, Venugopal Kotoju, “Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol”, COMPUSOFT, An international journal of advanced computer technology, 2 (7), July-2013 (Volume-II, Issue-VII).
[15] R.Bhairavi, A.Santhiya," Intelligent Scheme for Defending Against Black-Hole Attacks by Malicious Nodes in Dynamic Source Routing Protocol", International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: 2321-2152 Volume No.-4, Issue No.-2, March 2016.
[16] Shim, W., Kim, G. and Kim, S. (2010) ‘A distributed sinkhole detection method using cluster analysis', Expert Systems with Applications, Vol. 37, No. 12, pp.8486–8491, Elsevier.
[17] S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks," Proceedings of MobiHoc, June 2002.
[18] S. Lee, B. Han, and M. Shin, “Robust routing in wireless ad hoc networks,” Proceedings of 31st ICPP Workshops, pp. 73–78, Aug. 2002
[19] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceeding of 6th Annual International Conference on Mobile Computing and Network, Boston, MA, pp. 255–265, 2000
[20] Tirthraj Rai1 & Ashish Jain2, "Secure Routing in Mobile Ad hoc Network", International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 125-127
[21] Tseng, H.C., and Culpepper, B.J. (2005) ‘Sinkhole intrusion in mobile ad hoc networks: the problem and some detection indicators', Computers & Security, Vol. 24, No. 7, pp.561–570, Elsevier.
[22] Manel Guerrero Zapata, N. Asokan. "Securing Ad hoc Routing Protocols".
[23] Nisha Puri, Simranjit Kaur, Sandeep Kumar Arora. "Performance Analysis of Mobile Ad Hoc Network in the Presence of Sink Hole attack". International Journal of Scientific Engineering and Research (IJSER). Volume 1 Issue 3, November 2013.
[24] Semih Dokurer, Y. M. Erten, Can Erkin Acar, " Performance analysis of ad-hoc networks under black hole attacks". Department of Computer Engineering, Southeastcon Journal. 2007.
[25] Monika, Denial of Service Attacks in Wireless Mesh Networks, Monika /(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3), 2012,4516-4522.

Downloads

Published

2017-02-21

How to Cite

Hijazi, S., Moshref, M., & Al-Sharaeh, S. (2017). Enhanced AODV Protocol for Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 16(1), 7535–7547. https://doi.org/10.24297/ijct.v16i1.5728

Issue

Section

Research Articles