AODV Based Black-Hole Attack Mitigation in MANET
Packet dropping is a very dangerous attack in case of limited resource networks like Mobile Ad-Hoc Network (MANET). During this attack the malicious node first claims that it has the freshest route to the destination, so the sender selects this as the coordinating node and starts sending data packets to the destination via this node. But afterwards it drops them rather forwarding to the destination. In this paper we give a very clever packet dropping or Black-hole attack detection and prevention technique. Here we use the notion of AODV’s sequence number for identifying the Black-hole node in the network. Without using any extra packet or modifying any of the existing packet formats our method can efficiently detect and prevent the Black-hole or packet dropping attack in MANET. All the detection prevention are done by the originator node, so the originator need not relying on the other nodes in the network for this purpose. This method not only detects or prevents the Black-hole attack but is also capable to isolating the Black-hole node from the network.
KeywordsBlack-hole attack AODV AODV sequence number Pack dropping attack
Unable to display preview. Download preview PDF.
- 2.Karmore, P., Bodkhe, S.: A Survey on Intrusion in Ad Hoc Networks and its Detection Measures. International Journal on Computer Science and Engineering, IJCSE (2011)Google Scholar
- 3.Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different Types of Attacks on Integrated MANET-Internet Communication. International Journal of Computer Science and Security, IJCSS 4(3) (2010)Google Scholar
- 4.Perkins, C.E., Belding-Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, The Internet Engineering Task Force, Network Working Group (2003), http://www.ietf.org/rfc/rfc3561.txt
- 5.Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on MOBICOM, Boston, Massachusetts, United States, pp. 255–265 (2000)Google Scholar
- 8.Al-Shurman, M., Yoo, S.M., Park, S.: Blackhole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference, ACM-SE’42, Huntsville, Alabama (April 2004)Google Scholar