Advertisement

Reliability Factor Based AODV Protocol: Prevention of Black Hole Attack in MANET

  • Prakhar GuptaEmail author
  • Pratyaksh Goel
  • Pranjali Varshney
  • Nitin Tyagi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 851)

Abstract

The characteristic of the ad hoc network that it is formed as per the requirements in absence of any administrator and every node in this network acts as a router makes it prone to attacks. This paper proposes a reliability-based AODV protocol using which malicious node can be prevented. It considers black hole attack in which the malicious node becomes a part of the network by sending fake RREP with high sequence number and drops all the packets, instead of forwarding. The proposed method is successful in increasing packet delivery ratio and throughput, and it also reduces end to end delay in a network.

Keywords

Black hole attack MANET AODV 

References

  1. 1.
    Jain, A., Prajapati, U., Chouhan, P.: Trust based mechanism with AODV protocol for prevention of black-hole attack in manet scenario. In: Symposium on Colossal Data Analysis and Networking (CDAN), pp. 1–4. IEEE (2016)Google Scholar
  2. 2.
    Sharma, N., Sharma, A.: The black-hole node attack in manet. In: 2012 Second International Conference on Advanced Computing & Communication Technologies (ACCT), pp. 546–550. IEEE (2012)Google Scholar
  3. 3.
    Singh, S., Mishra, A., Singh, U.: Detecting and avoiding of collaborative black hole attack on manet using trusted aodv routing algorithm. In: Symposium on Colossal Data Analysis and Networking (CDAN), pp. 1–6. IEEE (2016)Google Scholar
  4. 4.
    Devassy, A., Jayanthi, K.: Prevention of black hole attack in mobile ad-hoc networks using mn-id broadcasting. Int. J. Mod. Eng. Res. 2(3) (2012)Google Scholar
  5. 5.
    Chauhan, R., et al.: An assessment based approach to detect black hole attack in MANET. In: 2015 International Conference on Computing, Communication & Automation (ICCCA), pp. 552–557. IEEE (2015)Google Scholar
  6. 6.
    Sowmya, K., Rakesh, T., Hudedagaddi, D.P.: Detection and prevention of blackhole attack in manet using aco. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 12(5), 21 (2012)Google Scholar
  7. 7.
    Narayanan, S.S., Radhakrishnan, S.: Secure aodv to combat black hole attack in MANET. In: 2013 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 447–452. IEEE (2013)Google Scholar
  8. 8.
    Sathish, M., Arumugam, K., Pari, S.N., Harikrishnan, V.: Detection of single and collaborative black hole attack in MANET. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2040–2044. IEEE (2016)Google Scholar
  9. 9.
    Thachil, F., Shet, K.: A trust based approach for aodv protocol to mitigate black hole attack in manet. In: 2012 International Conference on Computing Sciences (ICCS), pp. 281–285. IEEE (2012)Google Scholar
  10. 10.
    Jaiswal, P., Kumar, D.R.: Prevention of black hole attack in MANET. IRACST–Int. J. Comput. Netw. Wirel. Commun. (IJCNWC), ISSN, pp. 2250–3501 (2012)Google Scholar
  11. 11.
    Alem, Y.F., Xuan, Z.C.: Preventing black hole attack in mobile ad-hoc networks using anomaly detection. In: 2010 2nd International Conference on Future Computer and Communication (ICFCC), vol. 3, pp. V3–672. IEEE (2010)Google Scholar
  12. 12.
    Tamilselvan, L., Sankaranarayanan, V.: Prevention of co-operative black hole attack in manet. JNW 3(5), 13–20 (2008)CrossRefGoogle Scholar
  13. 13.
    Rajput, S.S., Trivedi, M.C.: Securing zone routing protocol in manet using authentication technique. In: 2014 International Conference on Computational Intelligence and Communication Networks, pp. 872–877, Nov 2014Google Scholar
  14. 14.
    Arya, K.V., Rajput, S.S.: Securing AODV routing protocol in MANET using NMAC with HBKS technique. In: 2014 International Conference on Signal Processing and Integrated Networks (SPIN), pp. 281–285, Feb 2014Google Scholar
  15. 15.
    Roy, D.B., Chaki, R.: Baids: detection of blackhole attack in manet by specialized mobile agent. Int. J. Comput. Appl. 40(13), 1–6 (2012)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Prakhar Gupta
    • 1
    Email author
  • Pratyaksh Goel
    • 1
  • Pranjali Varshney
    • 1
  • Nitin Tyagi
    • 1
  1. 1.GLA UniversityMathuraIndia

Personalised recommendations