Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET

Authors

  • Jamgade M Dept. of Computer Science and Engineering, RGPV, India
  • Shukla V Dept. of Computer Science and Engineering (KNP Bhopal), India

Keywords:

Wireless Ad-Hoc Network, Blackhole Attack, Tunnel, Performance Analysis, Routing Protocol, MANET Security

Abstract

Mobile Ad hoc Network (MANET) is a new field of communication operating in an extremely unpredictable and dynamic environment. These networks are gaining increasing popularity in recent years because of their ease of deployment. A MANET consists of collection of wireless mobile nodes that are capable of communicating with each other without the use of any network or any centralized administration. In ad hoc networks, routing protocols are challenged with establishing and maintaining multi-hop routes with security in the face of mobility, bandwidth limitation and power constraints. In particular in MANET, any node may be compromise the routing protocol functionality by disrupting the route discovery process. To achieve broad protection and desirable network performance, routing security is unavoidable. In this research work, a secure routing protocol for MANET is designed with the countermeasures to reduce or eliminate different types of security vulnerabilities and attacks. This paper provides routing security to the Ad hoc on demand Distance Vector (AODV) routing protocol by eliminating the threat of Black Hole attack, Wormhole attack, Rushing attack, and Impersonation attack. The proposed solutions are tested using Network Simulator2 (NS2), a scalable network simulator. The performance is studied for in various routing parameters such as packet delivery ratio, average end - to - end delay and routing overhead and are compared with the AODV and DSR. Hence we have known Cryptographic algorithm such as RSA (Rivest Shamir Adleman) Algorithm is used for providing a secure routing between mobile nodes even in the presence of malicious nodes .In brief, this paper presents a counter measure to overcome Black hole attack.

References

Perkins and Royer,E. “Ad-hoc On-Demand Distance Vector Routing,” Second IEEE Workshop on Mobile Computer Systems and Applications, pp. 90-100, February 1999.

Haas, Pearlman, and Samar. ZRP IEFT-MANET DRAFT, 5 Edition, July 2002.

Razak, A. S., Furnell, M. and Brooke, P. J. "Attacks against Mobile Ad-hoc Networks Routing Protocols," 2004.

Sanzgiri. K., LaFlammey, D., Dahilly,B.(2002). Authenticated Routing for Ad hoc Networks, IEEE, 2002

Abbas, S., Merabti, M., Jones, D.L., Kifayat, K., Lightweight Sybil Attack Detection in MANETs, IEEE Systems Journal, Vol. 7, No. 2, 2013

Guan, Q., Yu, F.R., Jiang, S., Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications, IEEE Transactions on vehicular technology, Vol. 61, No. 6, July 2012

Ming-Yang, S. “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems”, Computer communications, Vol.34, No.1, pp.107-117, 2010.

Gupta, S., Gill, S. and Joshi, A. “Analysis of Black Hole Attack on AODV and OLSR Routing Protocols in MANET”, International journal of Computer application, Issue 1, Vol 1, pp. 11 – 19,October 2011.

Zapata, M.G. “ Secure Ad-hoc On-Demand Distance Vector Routing”, Mobile Computing and Communications Review, Volume 6, Number 3, pp. 106 – 107.(2002).

Khalil, Bagchi,S. andShroff,N.B. “LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks, in: International Conference on Dependable Systems and Networks (DSN), 2005, pp. 612–621.

Kannhavong,B.,Nakayama,H., Nemoto,Y. and Kato, N.“A Survey Of Routing Attacks In Mobile Ad-hoc Networks”, IEEE Wireless Communications , pp. 85- 91,October 2007.

Putra, S. “An overview of mobile ad hoc networks for the existing protocols and applications”, International journal on applications of graph theory in wireless ad hoc networks and sensor networks, Vol.2, No.1, pp.87-110, 2010.

Rakesh kumar Sahu,Narendra S chaudhari “performance evaluation of ad hoc network under black hole attack 978-1-4673-4805- 8/$31.00, IEEE 2012

Prasad lokulwar* and vivek shelkhe, “Security aware routing protocol for MANET using asymmetric cryptography using RSA algorithm”, BIO-INFO Security Informatics ISSN: 2249-9423 &E-ISSN: 2249-9431, Volume 2, Issue 1, pp.-11-14. 2012.

Kameswari Chebrolu “NS2 Tutorial” Dept. of Computer Science and Engineering, IIT Bombay.

Downloads

Published

2025-11-11

How to Cite

[1]
M. Jamgade and V. Shukla, “Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET”, Int. J. Comp. Sci. Eng., vol. 4, no. 2, pp. 145–150, Nov. 2025.

Issue

Section

Research Article