Advertisement

AODV Based Black-Hole Attack Mitigation in MANET

  • Subhashis Banerjee
  • Mousumi Sardar
  • Koushik Majumder
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 247)

Abstract

Packet dropping is a very dangerous attack in case of limited resource networks like Mobile Ad-Hoc Network (MANET). During this attack the malicious node first claims that it has the freshest route to the destination, so the sender selects this as the coordinating node and starts sending data packets to the destination via this node. But afterwards it drops them rather forwarding to the destination. In this paper we give a very clever packet dropping or Black-hole attack detection and prevention technique. Here we use the notion of AODV’s sequence number for identifying the Black-hole node in the network. Without using any extra packet or modifying any of the existing packet formats our method can efficiently detect and prevent the Black-hole or packet dropping attack in MANET. All the detection prevention are done by the originator node, so the originator need not relying on the other nodes in the network for this purpose. This method not only detects or prevents the Black-hole attack but is also capable to isolating the Black-hole node from the network.

Keywords

Black-hole attack AODV AODV sequence number Pack dropping attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks 6(1), 32–46 (2008)CrossRefGoogle Scholar
  2. 2.
    Karmore, P., Bodkhe, S.: A Survey on Intrusion in Ad Hoc Networks and its Detection Measures. International Journal on Computer Science and Engineering, IJCSE (2011)Google Scholar
  3. 3.
    Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different Types of Attacks on Integrated MANET-Internet Communication. International Journal of Computer Science and Security, IJCSS 4(3) (2010)Google Scholar
  4. 4.
    Perkins, C.E., Belding-Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, The Internet Engineering Task Force, Network Working Group (2003), http://www.ietf.org/rfc/rfc3561.txt
  5. 5.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on MOBICOM, Boston, Massachusetts, United States, pp. 255–265 (2000)Google Scholar
  6. 6.
    Jain, S., Jain, M., Kandwal, H.: Advanced algorithm for detection and prevention of cooperative black and Grayhole attacks in mobile ad hoc networks. J. Computer Applications 1(7), 37–42 (2010)CrossRefGoogle Scholar
  7. 7.
    Shree, R., Dwivedi, S.K., Pandey, R.P.: Design Enhancements in ZRP for Detecting Multiple Blackhole Nodes in Mobile Ad Hoc Networks. International Journal of Computer Applications 18(5), 6–10 (2011)CrossRefGoogle Scholar
  8. 8.
    Al-Shurman, M., Yoo, S.M., Park, S.: Blackhole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference, ACM-SE’42, Huntsville, Alabama (April 2004)Google Scholar
  9. 9.
    Banerjee, S., Majumder, K.: A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 372–384. Springer, Heidelberg (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Subhashis Banerjee
    • 1
  • Mousumi Sardar
    • 1
  • Koushik Majumder
    • 1
  1. 1.Department of Computer Science and EngineeringWest Bengal University of TechnologyKolkataIndia

Personalised recommendations