INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.4, No.6, Jun. 2012

Preventive Aspect of Black Hole Attack in Mobile AD HOC Network

Full Text (PDF, 298KB), PP.49-55


Views:177   Downloads:7

Author(s)

Kumar Roshan,Vimal Bibhu

Index Terms

AODV – Ad Hoc On Demand Distance Vector Routing, MANET–Mobile Ad Hoc Network, DSDV,CBR -Constant bit Pattern, TCP – Transmission Control Protocol

Abstract

Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV) are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET) to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0. 

Cite This Paper

Kumar Roshan,Vimal Bibhu,"Preventive Aspect of Black Hole Attack in Mobile AD HOC Network", IJCNIS, vol.4, no.6, pp.49-55, 2012.

Reference

[1]Tamilselvan, L and Sankaranarayanan, V. (2007). Prevention of blackhole attack in MANET. The 2nd International Conference on Wireless Broadband and Ultra WidebandCommunications.AusWireless,21-21.

[2]Chen Hongsong; Ji Zhenzhou; and Hu Mingzeng (2006). A novel security agent scheme for AODV routing protocol based on thread state transition. Asian Journal of Information Technology,5(1),54-60.

[3]Sanjay Ramaswamy; Huirong Fu; Manohar Sreekantaradhya; John Dixon; and Kendall Nygard (2003). Prevention of cooperative black hole attack in wireless Ad hoc networks. In Proceedings of 2003 International Conference on Wireless Networks, (ICWN'03), Las Vegas, Nevada, USA, pp. 570-575.

[4]T. Clausen, P. Jacquet, "Optimized Link State Routing Protocol (OLSR)", RFC 3626, Oct. 2003.

[5]J. Hortelano et al., "Castadiva: A Test-Bed Architecture for Mobile AD HOC Networks", 18th IEEE Int. Symp. PIMRC, Greece, Sept. 2007.

[6]Vesa Kärpijoki,"Security in Ad hoc Networks," http://www.tcm.hut.fi/Opinnot/Tik110.501/2000/papers/karpijoki.pdf.

[7]Janne Lundberg, "Routing Security in Ad Hoc Networks," http://citeseer.nj.nec.com/cache/papers/cs/19440/http:zSzzSzwww.tml.hut.fizSz~jluzSznetseczSz netsec-lundberg.pdf/routing-security-in-ad.pdf

[8]Charles E. Perkins, and Elizabeth M. Royer, "Ad-hoc On-Demand Distance Vector (AODV) Routing," Internet Draft, November 2002.

[9]B.Wu et al., "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Wireless/Mobile Network Security, Springer, vol. 17,2006. 

[10]Sanjay Ramaswamy, Huirong Fu ,Manohar Sreekantaradhya, John Dixon and Kendall Nygard. "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks". Department of Computer Science, IACC 258 North Dakota State Universities, Fargo, ND 58105.

[11]P. Michiardi, R. Molva. "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks". European WirelessConference, 2002.

[12]Santoshi Kurosawal, hidehisa, Nakayama, Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto. "Detecting Blackhole Attack on AODV – based Mobile Ad Hoc Networks by Dynamic Learning Method" in International Journal of Network Security, Vol.5, No.3, pp.338-346, Nov.2007.