Simulative Study of Black Hole Attack for Wireless Networks and Network Performance Analysis Over NS2

  • Authors

    • Monika Jain
    • Rahul Saxena
    • Aashis Kumar
    • Tushar Sadana
    • Vidyanshu Jain
    • Siddharth Jaidka
    2018-12-19
    https://doi.org/10.14419/ijet.v7i4.41.24514
  • Security, efficiency, black hole attack
  • Wireless networks are the most popular and widely used class of networks in the world. Because of its extreme level usage, it is more prompt to attack in the network. In recent times there has been increase in the frequency of cyber-attacks for example Ransomware that has affected various organization of different sectors (Health care, defense etc). In order to prevent such attacks on our systems it is important to understand the methodology of these attacks and how they impact the efficiency of available network.  This paper provides us the insight about how such an attack is performed and what are the counter measure we can take to improve the security of network system in place around the world. The major objective of the paper is the simulation of Black hole attack on a wireless network and studying its effects. We have also evaluated the network efficiency with varying number of nodes under the conditions of with and without attack.

     

     

  • References

    1. [1] Jai Shree Mehta, Shilpa Nupur, Swati Gupta: An Overview of MANET: Concepts, Architecture & Issues, International Journal of Research in Management, Science & Technology (E-ISSN: 2321-3264) Vol. 3, No. 2, April 2015.

      [2] Iqbaldeep Kaur, Navneet Kaur, Tanisha, Gurmeen, Deepi: Challenges and Issues in Adhoc Network, IJCST Vol. 7, Issue 4, Oct - Dec 2016 ISSN: 0976-8491 (Online) | ISSN: 2229-4333 (Print)

      [3] Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park: Black hole attack in mobile Ad Hoc networks, ISBN:1-58113-870-9 doi>10.1145/986537.986560.

      [4] C.V. Anchugam* and K. Thangadurai: Detection of Black Hole Attack in Mobile Ad-hoc Networks using Ant Colony Optimization – simulation Analysis, Indian Journal of Science and Technology, Vol 8(13), DOI: 10.17485/ijst/2015/v8i13/58200, July 2015.

      [5] FIHRI Mohammed, LAVETE, Morocco, LAVETE: The Impact of Black-Hole Attack on AODV Protocol, International Journal of Advanced Computer Science and Applications (IJACSA).

      [6] Rooshabh Kothari discusses: Implementation of Black Hole Security Attack using Malicious Node for Enhanced - DSR Routing Protocol of MANET, International Journal of Computer Applications, (0975 – 8887) Volume 64– No.18, February 2013.

      [7] Debarati Roy, LeenaRagha, Dr.bNilesh Marathe: Implementing and Improving the Performance of AODV by Receive Reply Method and Securing it from Black Hole Attack, International Conference on Advanced Computing Technologies and Applications (ICACTA2015), https://doi.org/10.1016/j.procs.2015.03.109.

      [8] Ashwini Hosgouda, Shobha m s, Akshay Shivanand: Implementation of Black Hole Attack Detection and Mitigation in MANET Using Advance BFO Algorithm, International Journal of Advanced Research in Computer Science and Software Engineering, 2015.

      [9] Amandeep Kaur, Praveen Kaur, Harish ran Aggarwal: Implementation of Black hole attacks in WSN using Genetic Algorithm and PSO, Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 4 (2017), pp. 717-726.

      [10] S. Biswas, T. Nag and S. Neogy: Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET, 2014 Applications and Innovations in Mobile Computing (AIMoC), Kolkata, 2014, pp. 157-164. doi: 10.1109/AIMOC.2014.6785535

      [11] N. Boumkheld, M. Ghogho and M. El Koutbi: Intrusion detection system for the detection of blackhole attacks in a smart grid, 2016 4th International Symposium on Computational and Business Intelligence (ISCBI), Olten, 2016, pp. 108-111. doi: 10.1109/ISCBI.2016.7743267.

      [12] A. Salunke and D. Ambawade: Dynamic Sequence Number Thresholding protocol for detection of blackhole attack in Wireless Sensor Network, 2015 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, 2015, pp. 1-4. doi: 10.1109/ICCICT.2015.7045745

      [13] Jain, Monika, and Rahul Saxena. "Overview of VANET: Requirements and its routing protocols." Communication and Signal Processing (ICCSP), 2017 International Conference on. IEEE, 2017.

      [14] Jain, Monika, and Rahul Saxena. "VANET: Security Attacks, Solution and Simulation." Proceedings of the Second International Conference on Computational Intelligence and Informatics. Springer, Singapore, 2018.

  • Downloads

  • How to Cite

    Jain, M., Saxena, R., Kumar, A., Sadana, T., Jain, V., & Jaidka, S. (2018). Simulative Study of Black Hole Attack for Wireless Networks and Network Performance Analysis Over NS2. International Journal of Engineering & Technology, 7(4.41), 139-144. https://doi.org/10.14419/ijet.v7i4.41.24514