Skip to main content
Log in

ABGF-AODV protocol to prevent black-hole, gray-hole and flooding attacks in MANET

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Wireless ad hoc networks play a pivotal role in wireless communication systems. MANETs find extensive applications across various domains, encompassing real-time information exchange, network partitioning, rescue operations, interpersonal communication, and data sharing. MANET works as dynamic wireless networks without a fixed infrastructure in which nodes freely join or leave the network at any time. The absence of fixed infrastructure coupled with openness characteristics of MANET poses significant security issues. This paper proposes a technique called as Anti-blackhole, Gray-hole, and Flooding attack-Ad-hoc On-Demand Distance Vector (ABGF-AODV) to identify and thwart the impact of attacks in MANETs. Through extensive evaluation utilizing the NS-2 simulator, the performance of the proposed protocol is thoroughly examined. The results showcase the robustness of the ABGF-AODV protocol against various attacks, yielding better performance as compared with existing state of art technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Algorithm 4
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Data availability

The authors confirm that the data supporting the findings of this study are available within the article.

References

  1. Kurian, S., & Ramasamy, L. (2021). Novel AODV based service discovery protocol for MANETS. Wireless Networks. https://doi.org/10.1007/s11276-021-02596-0

    Article  Google Scholar 

  2. Arul Selvan, M., & Selvakumar, S. (2019). Malicious node identification using quantitative intrusion detection techniques in MANET. Cluster Computing, 22(Suppl 3), 7069–7077. https://doi.org/10.1007/s10586-018-2418-2

    Article  Google Scholar 

  3. Hameed, A., & Al-Omary, A. (2019). Survey of blackhole attack on MANET. IET. https://doi.org/10.1049/cp.2019.0224

    Article  Google Scholar 

  4. Tiruvakadu, D. S. K., & Pallapa, V. (2018). Honeypot based black-hole attack confirmation in a MANET. International Journal of Wireless Information Networks, 25, 434–448. https://doi.org/10.1007/s10776-018-0415-2

    Article  Google Scholar 

  5. Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications, 90, 1039–1050. https://doi.org/10.1007/s11277-016-3318-5

    Article  Google Scholar 

  6. Gurung, S., & Chauhan, S. (2019). Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wireless Networks, 25, 975–988. https://doi.org/10.1007/s11276-017-1639-2

    Article  Google Scholar 

  7. Yi, P., Wu, Y., & MA, J. (2009). Experimental evaluation of flooding attacks in mobile ad hoc networks. In: IEEE International Conference on Communications Workshops, pp. 1–4.

  8. Yeung, D. S., Jin, S., & Wang, X. (2007). Covariance-matrix modeling and detecting various flooding attacks. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 37(2), 157–169.

    Article  Google Scholar 

  9. Yasin, A., & Abu, Z. M. (2018). Detecting and isolating black hole attacks in MANET using timer based baited technique. Wireless Communication and Mobile Computing. https://doi.org/10.1155/2018/9812135

    Article  Google Scholar 

  10. Gurung, S., & Chauhan, S. (2018). A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Networks, 24, 2957–2971. https://doi.org/10.1007/s11276-017-1514-1

    Article  Google Scholar 

  11. Ndajah, P., Matine, A. O., & Hounkonnou, M. N. (2019). Black hole attack prevention in wireless peer-to-peer networks: A new strategy. International Journal of Wireless Information Networks, 26, 48–60. https://doi.org/10.1007/s10776-018-0418-z

    Article  Google Scholar 

  12. Merlin, R. T., & Ravi, R. (2019). Novel trust based energy aware routing mechanism for mitigation of black hole attacks in MANET. Wireless Personal Communications, 104, 1599–1636.

    Article  Google Scholar 

  13. Khalladi, R., Rebbah, M., & Smail, O. (2021). A new efficient approach for detecting single and multiple black hole attacks. The Journal of Supercomputing, 77, 7718–7736. https://doi.org/10.1007/s11227-020-03596-1

    Article  Google Scholar 

  14. Sivanesh, S., & Sarma Dhulipala, V. R. (2022). Analytical termination of malicious nodes (ATOM): An intrusion detection system for detecting black hole attack in mobile ad hoc networks. Wireless Personal Communication, 124, 1511–1524. https://doi.org/10.1007/s11277-021-09418-8

    Article  Google Scholar 

  15. Sivanesh, S., & Dhulipala, V. R. S. (2021). Accurate and cognitive intrusion detection system (ACIDS): A novel black hole detection mechanism in mobile ad hoc networks. Mobile Networks and Applications, 26, 1696–1704. https://doi.org/10.1007/s11036-019-01505-2

    Article  Google Scholar 

  16. Rani, P., Kavita, S. V., Rawat, D. B., & Dash, S. (2022). Mitigation of black hole attacks using firefly and artificial neural network. Neural Computing and Applications, 34(18), 15101–15111. https://doi.org/10.1007/s00521-022-06946-7

    Article  Google Scholar 

  17. Mankotia, V., Sunkaria, R. K., & Gurung, S. (2023). DT-AODV: A dynamic threshold protocol against black-hole attack in MANET. Sādhanā, 48, 190. https://doi.org/10.1007/s12046-023-02227-8

    Article  Google Scholar 

  18. Kaushik, S., Tripathi, K., Gupta, R., & Mahajan, P. (2024). Enhancing reliability in mobile ad hoc networks (MANETs) through the K-AOMDV routing protocol to mitigate black hole attacks. SN Computer Science, 5(2), 263.

    Article  Google Scholar 

  19. Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating route request flooding attack in MANET. Wireless Networs, 24, 2899–2914. https://doi.org/10.1007/s11276-017-1515-0

    Article  Google Scholar 

  20. Zant, M. A., & Yasin, A. (2019). Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV). Security and Communication Networks. https://doi.org/10.1155/2019/8249108

    Article  Google Scholar 

  21. Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communication, 106, 365–376. https://doi.org/10.1007/s11277-019-06166-8

    Article  Google Scholar 

  22. Mankotia, V., Sunkaria, R. K., & Gurung, S. (2023). DT-AODV: A dynamic threshold protocol against black-hole attack in MANET. Sādhanā, 48(4), 190.

    Article  Google Scholar 

  23. Singh, G., & Joshi, G. (2021). A novel statistical adhoc on-demand distance vector routing protocol technique is using for preventing the mobile adhoc network from flooding attack. Turkish Journal of Turkish Journal of Computer and Mathematics Education, 12(6), 1753–1765. https://doi.org/10.17762/turcomat.v12i6.3779

    Article  Google Scholar 

  24. Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray hole attack in MANET. Wireless Networks, 24, 565–579. https://doi.org/10.1007/s11276-016-1353-5

    Article  Google Scholar 

  25. Moradipour, O., & Fathi, M. (2020). An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network. International Journal of Wireless Information Networks, 27, 558–567. https://doi.org/10.1007/s10776-020-00492-6

    Article  Google Scholar 

  26. Vatambeti, R. (2020). A novel wolf based trust accumulation approach for preventing the malicious activities in mobile ad hoc network. Wireless Personal Communications, 113, 2141–2166. https://doi.org/10.1007/s11277-020-07316-z

    Article  Google Scholar 

  27. Mankotia, E. V., Sunkaria, R. K., & Gurung, S. (2023). Dual security based protocol against gray-hole attack in MANET. Adhoc & Sensor Wireless Networks. Vol. 56.

  28. Shafi, S., Mounika, S., & Velliangiri, S. J. P. C. S. (2023). Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET. Procedia Computer Science, 218, 2309–2318.

    Article  Google Scholar 

  29. The network simulator-ns-2. http://www.isi.edu/nsnam/ns/

Download references

Acknowledgements

Not applicable.

Funding

The authors confirm that for this research no funding was received.

Author information

Authors and Affiliations

Authors

Contributions

All authors have contributed equally in this paper. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Shashi Gurung.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interests.

Ethical approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Human and animal rights

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gurung, S., Mankotia, V. ABGF-AODV protocol to prevent black-hole, gray-hole and flooding attacks in MANET. Telecommun Syst (2024). https://doi.org/10.1007/s11235-024-01154-1

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11235-024-01154-1

Keywords

Navigation