Abstract
MANET is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks including BlackHole attack. BlackHole node advertises itself as having freshest or shortest path to a specific node to absorb packets. The effect of BlackHole attack on AODV will be addressed in this paper by using cryptography technique for securing route discovery and data transmission. Simulation results using NS2 depict the improvement of packet delivery ratio and network throughput in the presence of BlackHole nodes.
Article PDF
Avoid common mistakes on your manuscript.
References
R. H. Khokhar, A. N. Ngadi, A. Mandala, A review of current routing attacks in mobile ad hoc networks, Intl. Journal of Computer Science and Security, vol. 2, Issue-3, (2008), pp. 18–29
C. E. Perkins, E. M. B. Royer and S. R. Das, Ad-hoc On-Demand Distance Vector (AODV) Routing, Mobile Ad-hoc Networking Working Group, Internet Draft, draft-ietf-manetaodv- 00.txt, (Feb, 2003).
M. Al-Shurman, S-M. Yoo, and S. Park, BlackHole Attack in Mobile Ad Hoc Networks, ACM Southeast Regional Conf, (2004).
S. Lu, L. Li, K-Y Lam, L. Jia, SAODV: A MANET Routing Protocol that can Withstand BlackHole Attack, Proc. of Intl. Conference on Computational Intelligence and Security (CIS ’09), Dec. 11–14, (Beijing, China, 2009), pp. 421–425.
S. Deswal and S. Singh, Implementation of Routing Security Aspects in AODV, Intl. Journal of Computer Theory and Engineering, Vol. 2, No. 1, (Feb, 2010).
A. Pirzada, C. McDonald, Secure routing with the AODV protocol, Proc. The Asia-Pacific Conference on Communications, (2005), 57–61.
B. Dahill, B.N. Levine, E. Royer, and C. Shields, ARAN: A secure routing protocol for ad hoc networks, UMass Tech Report 02–21, (2002).
S. Tan, M. Choi, K. Kim, The New Mechanism to Detect and Prevent BlackHole Attacks on AODV-based MANET, Vol. 684, (April 2013), pp. 547–550.
B. Schneier, Applied cryptography. J. Wiley and sons inc, (1996).
Advanced Encryption Standard (AES) (FIPS PUB 197).”National Institute of Standards and Technology (NIST)", (Nov 2001).
T. Issariyakul, E. Hossain, Introduction to network simulation ns2, (July 2008).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Tan, S., Sok, P. & Kim, K. Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. Int J Netw Distrib Comput 2, 100–107 (2014). https://doi.org/10.2991/ijndc.2014.2.2.4
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.2014.2.2.4