A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET
- 142 Downloads
Mobile Ad hoc network (MANET) is a wireless network which is characterized by dynamic network topology, open medium, multi-hop communication etc. in which each device not only acts as a router but also as a host. Security in the mobile ad-hoc network is one of the most sought-after research topic. The performance of MANET is greatly affected by the presence of malicious nodes in the network. One of the most common attacks in MANET is a denial of service attack in which the source node is not able to communicate with the destination node due to malicious behaviour of the node. The malicious node which drops the packet is known as a black-hole node. In order to mitigate the black-hole attack problem, various techniques have been used by many researchers. In this paper, based on a dynamic sequence number threshold value, MBDP-AODV protocol is used. The main contribution of this paper is the performance evaluation of MBDP-AODV protocol under black-hole attack. Through simulation, it has been found that MBDP-AODV protocol is able to mitigate the impact of black-hole attack under different network density. Although it improves the network performance in terms of packet delivery, throughput and reduces the normalized routing load but it has high routing overhead.
KeywordsMANET Black hole attack Sequence number based AODV MBDP-AODV Denial of service attack
- 3.Jhaveri, R. H., Patel, S. J. & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey, In IEEE 2nd International Conference on Advanced Computing & Communication Technologies. Google Scholar
- 8.Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE International Conference on WiSPNET (pp. 2409–2415). Google Scholar
- 9.Li, C., Wang, Z., & Yang, C. (2010). SEAODV: A security enhanced AODV routing protocol for wireless mesh networks. In IEEE International Workshop on Selected Topics in Mobile and Wireless Computing (pp. 699–706).Google Scholar
- 10.Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE 9th Malaysia International Conference (pp. 530–535). https://doi.org/10.1109/MICC.2009.5431439.
- 12.Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Systems, Modelling and Simulation (ISMS) (pp. 338–343).Google Scholar
- 13.Vadhana, S. K. & Paramasivan, B. (2015). Ant based defense mechanism for selective forwarding attack in MANET. In IEEE ICDE Workshops (pp. 92–97).Google Scholar
- 14.Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K., & Banerjee, P. K. (2012). Two-level secure re-routing (TSR) in mobile ad hoc networks. In International Conference on Advances in Mobile Network, Communication and Its Applications (pp. 119–122).Google Scholar
- 15.Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Proceedings of IEEE Conference on Information and Communication Technologies (pp. 479–484).Google Scholar
- 18.Gurung, S, Saluja, K. K. (2014). Mitigating impact of blackhole attack in MANET. In Proceedings of 5th, ACEEE International Conference on Recent Trends in Information, Telecommunication and Computing, ITC (pp. 229–237).Google Scholar
- 19.The Network Simulator-NS-2.35 (2016). http://www.isi.edu/nsnam/ns/.