A Reliable and Secure AODV Protocol for MANETs
-
2018-12-03 https://doi.org/10.14419/ijet.v7i4.38.27603 -
Mobile adhoc Network, AODV, relative velocity, black hole attack and Intrusion Detection System. -
Abstract
In recent years, Mobile ad hoc networks ((MANETs) have generated great interest among researchers in their implementation under several computing environments. However, MANETs are highly susceptible to various security attacks due to their inherent characteristics. The ad hoc on demand distance vector (AODV) is most suitable routing protocol for mobile adhoc networks in which resource consumption attacks are frequent if it is not detected timely. In this paper, we have proposed a scheme to detect as well as overcome black hole attacks using an Intrusion Detection System (IDS). The proposed scheme is implemented using network simulator 2(NS2) to compare its performance against the standard AODV with and without attack. The results of the simulation show that proposed scheme optimizes the end-to-end delay, normalized routing load, packet delivery fraction and average throughput in comparison with AODV protocols under black hole attack.
Â
Â
-
References
[1] Salehi, M., Darehshoorzadeh, A., & Boukerche, A. On the Effect of Black-hole Attack on Opportunistic Routing Protocols. In Proceedings of the 12th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks ,pp. 93-100. ACM. (2015)
[2] Hiremath, P. S., and T. Anuradha. "Performance Comparison of Cluster based and Threshold based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs." International Journal of Advanced Networking and Applications 6.3: 2352. (2014)
[3] Thachil, F., Shet , K. C.: A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET,Computing Sciences (ICCS), 2012 International Conference on, Phagwara,pp. 281-285(2012)
[4] Perkins, C.E., Royer, E.M. "Ad-hoc on-demand distance vector routing," Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on, New Orleans, LA, pp. 90-100.(1999)
[5] Jambli, M. N., Wan Mohd Shuhaimi, W. B., Lenando, H., Abdullah, J., & Suhaili, S. M. : Enhancement of AODV routing protocol in MASNETs. In IT in Asia (CITA), 2015 9th International Conference on,pp. 1-6.(2015)
[6] Zou, Y., & Chakrabarty, K. “Distributed mobility management for target tracking in mobile sensor networks,†IEEETrans. Mob. Comput. vol. 6, no. 8, pp. 872–887. (2007)
[7] Li, W., Chen, M., & Li, M. M. (2009). An enhanced aodv route protocol applying in the wireless sensor networks. In Fuzzy Information and Engineering Volume 2,pp. 1591-1600.(2009)
[8] Murthy, C. Siva Ram, and B. S. Manoj. :Ad Hoc Wireless Networks: Architectures and Protocols, Portable Documents. Pearson education.(2004)
[9] Dhurandher, S.K., Isaac W., Mathur, R., & Khurana, P.: GAODV: A Modified AODV against single andcollaborative Black Hole attacks in MANETs." In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on, pp. 357-362.(2013)
[10] Chen, H., Wu, H., Hu, J., & Gao, C. Event-based trust framework model in wireless sensor networks. In Networking, Architecture, and Storage, 2008. NAS'08. International Conference on (pp. 359-364). IEEE. (2008)
[11] Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. IJ Network Security, 5(3), pp.338-346.(2007)
[12] Ehsan, H., & Khan, F. A.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on ,pp. 1181-1187.(2012)
[13] Rathore, H., Badarla, V., Jha, S., & Gupta, A. Novel approach for security in wireless sensor network using Bio-inspirations. In Communication Systems and Networks (COMSNETS), 2014 Sixth International Conference on ,pp. 1-8.(2014)
[14] Khandelwal, V., & Goyal, D.: Black Hole Attack and Detection Method for AODV Routing Protocol in MANETs. IJARCET, 2(4), 1555-9. (2013)
[15] Djenouri, D. and Badache, N.: Struggling against selfishness and black hole attacks in MANETs. Wirel. Commun. Mob. Comput., 8: 689–704. (2008)
[16] Deng, H., Li, W., & Agrawal, D. P. Routing security in wireless ad hoc networks. Communications
[17] Magazine, IEEE, 40(10), 70-75. (2002)
[18] Zapata, M. G. Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing
[19] and Communications Review, 6(3), 106-107.(2002)
[20] Introduction to Network Simulator NS2(2nd Edition) by Teerawat Issariyakul, Ekra Hossain
[21] The Network Simulator (NS-2); http://nsnam.isi.edu/nsnam/index.php/User_Information
[22] Tcl Tutorial - Tcl/Tk; https://www.tcl.tk/man/tcl8.5/tutorial/tcltutorial.html
[23] Generating sensor node-movement and traffic-connection files for large wireless scenarios,
[24] http://www.isi.edu/nsnam/ns/tutorial/nsscript7.html
[25] Post processing NS2 Result using NS2 Trace — New Wireless Trace file format,
[26] http://ns2ultimate.tumblr.com/post/32176398101/post-processing-ns2-result-using-ns2-trace-new
-
Downloads
-
How to Cite
Kumar Singh Yadav, A., & K. Yadav, R. (2018). A Reliable and Secure AODV Protocol for MANETs. International Journal of Engineering & Technology, 7(4.38), 893-897. https://doi.org/10.14419/ijet.v7i4.38.27603Received date: 2019-02-20
Accepted date: 2019-02-20
Published date: 2018-12-03