Detection and Prevention of Wormhole & Black Hole Attacks in MANET Using AODV Protocol: Review
DOI:
https://doi.org/10.26438/ijcse/v6i8.386389Keywords:
MANET, Wormhole Attack,, Collaborative black hole Attack, Security, AODVAbstract
Mobile ad-hoc networks are the self-configuring mobile nodes which are connected through the wireless links with the decentralised networks. The nodes in MANET communicate with each other on the basis of mutual trust. Nodes dynamically form a temporary network and are protected using many firewalls and encryption software. But number of them is not sufficient and effective. So the main aim is to provide security services such as authentication, confidentiality, integrity, availability etc. to the mobile users. In this paper the effect of Black hole attack and Worm attack is analysed on the AODV routing protocol in MANET and prevention mechanism is presented to secure the network.
References
[1] J. Gronkvist, A. Hansson, and M. Skold, “Evaluation of a Specification-Based Intrusion Detection System for AODV”. 2007.
[2] M. Abolhasan, T. Wysocki, and E. Dutkiewicz “A review of routing protocols for mobile ad hoc networks.” Ad hoc networks, Vol.2 (1):pp.1–22, 2004.
[3] Kaur, Er. Sandeep Kaur Dhanda, “Analyzing the effect of Wormhole Attack on Routing Protocol in Wireless Sensor Network”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013.
[4] B. Bharagava, R. Oliveria, Y. Zhang and N. C. Idika, “ Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks,” In Proc. of 2009 29th IEEE Int. Conf. on Distributed Computing Systems Workshops, pp. 447-450, 2009.
[5] C.E. Perkins and E.M. Royer. “Ad-hoc on-demand distance vector routing”. In Second IEEE Workshop on Mobile Computing System and Application, WMCSA 99, pages 90 –100, Feb. 1999.
[6] Lui K.-S., sChiu H.S., “DelPHI: Wormhole Detection mechanism for Adhoc Wireless Networks” Proceedings of the 1st International Symposium on Wireless Pervasive Computing; Phuket, Thailand. 16–18 January 2006.
[7] Viren Mahajan, Maitreya Natu, and Adarshpal Sethi, “Analysis of wormhole Intrusion Attacks In MANETS”,IEEE Military Communications Conference,MILCOM. Nov 2008.
[8] Rashid Hafeez Khokhar, Md Asri Ngadi and Satira Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, Volume-2 Issue-3 pp. 18-29, , 2009.
[9] C. E. Perkins and E. M. Royer, “Ad Hoc On-Demand Distance Vector Routing,” In Proc. Of IEEEWorkshop on Mobile Comp. Sys.and Apps. Feb. 1999, pp. 90–100.
[10] S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, “Prevention of Cooperative Blackhole Attack in Wireless Ad Hoc Networks,” In Proc. of 2003 Int. Conf. on Wireless Networks, ICWN’03, Las Vegas, Nevada, USA, 2003, pp. 570–575.
[11] Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, j., and Nygard, K.“Prevention of cooperative black hole attack in wireless ad hoc networks”. In Proceedings of the International Conference on Wireless Networks, 2003
[12] H. Weerasinghe and H. Fu. “Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking” (fgcn 2007), volume 2, pages 362–367. IEEE, 2007.
[13] A. Baadache and A. Belmehdi.”Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks.” Arxiv preprint arXiv: 1002.1681, 2010.
[14] D. Eastlake and P. Jones, “Us secure hash algorithm 1 (sha1),” 2001.
[15] Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Packet Leashes: A Defence against Wormhole Attacks in Wireless Ad Hoc Networks”, IEEE 2003.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
