Abstract
A mobile Ad hoc network has been constructed as virtual backbone or spine of wireless medium. Due to nomadic habit of the node, MANET network are easily establish to a group of nodes with self configuring manner. MANET is simple to set and has changing Topology. Routing in a MANET is a particularly challenging task compared to a conventional network. For data transfer in MANET one of the most commonly used routing protocol is Ad hoc on demand distance vector (AODV), where routes provide on demand and node act as router. It’s performance is based on the services of the network, however MANET are vulnerable to attacks due to it’s dynamic, nomadic and open environment. However, network is vulnerable to the attacks by presence of malicious nodes. DOS and Black Hole attacks are two security threats in AODV.DOS attacks aims to disrupt the service provided by network or server by continuously sending unwanted packets using malicious node. In Black hole attack, the aim of this attack to capture the path and send fake route reply message and routing information. So to overcome from these consequences we propose an algorithm which introduce a mechanism of DOS and Black hole attacks prevention and check network performance in malicious environment on the analysis of throughput and end to end delay.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ismail, I.I., Jaafar, M.H.F.: Mobile ad hoc network overview. In: Proceedings of Asia-Pacific Conference on Applied Electromagnetics (2014)
Yau, P.-W., Hu, S., Mitchell, C.J.: Malicious attacks on ad hoc network routing protocols
Mishra, A., Nadkarni, K.M.: Security in wireless ad hoc network. In: The Hand Book of Ad Hoc Wireless Network. CRC Press Inc., Boca Raton (2003)
Kumar, V., Sharma, R., Kush, A.: Effect of malicious nodes on AODV in mobile ad hoc networks. Int. J. Comput. Sci. Manage. Res. 1(3), 395 (2012)
Michiardi, P., Molva, R.: CORE: A Collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP TC6/TC11 Sixth Joint Working Conference of Communication and Multimedia Security (2002)
Al-Omari, S.A.K., Sumari, P.: An overview of mobile ad hoc networks for the existing protocols and application. J. Appl. Graph Theory Wireless Ad-hoc Netw. Sens. Netw 2(1), 87 (2010)
Sheikhl, R., Chandee, M.S., Mishra, D.K.: Security issues in MANET: a review. In: 7th International Conference on Wireless and Optical Communications Networks (2010)
Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2 (2009)
Gambhir, S., Sharma, S.: PPN: prime product number based malicious node detection scheme for MANETS
Sheikhl, R., Chandee, M.S., Mishra ,D.K.: Security issues in MANET: a review. In: IEEE, pp. 1–4, Sept 2010. ISBN 978-1-4244-7203-1
Dr. Tamilarasan, S.: Securing and Preventing AODV routing protocol from black hole attack using counter algorithm. Int. J. Eng. Res. Technol. (IJERT) 1(5) (2012)
Akanksha Saini, Harish Kumar : Effect of black hole attack on AODV routing protocol In MANET. IJCST 1(2) (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Gupta, A., Patel, B., Rana, K., Pradhan, R. (2015). Improved AODV Performance in DOS and Black Hole Attack Environment. In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 2. Smart Innovation, Systems and Technologies, vol 32. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2208-8_49
Download citation
DOI: https://doi.org/10.1007/978-81-322-2208-8_49
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2207-1
Online ISBN: 978-81-322-2208-8
eBook Packages: EngineeringEngineering (R0)