Improved AODV Performance in DOS and Black Hole Attack Environment

  • Anurag Gupta
  • Bhupendra Patel
  • Kamlesh Rana
  • Rahul Pradhan
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 32)


A mobile Ad hoc network has been constructed as virtual backbone or spine of wireless medium. Due to nomadic habit of the node, MANET network are easily establish to a group of nodes with self configuring manner. MANET is simple to set and has changing Topology. Routing in a MANET is a particularly challenging task compared to a conventional network. For data transfer in MANET one of the most commonly used routing protocol is Ad hoc on demand distance vector (AODV), where routes provide on demand and node act as router. It’s performance is based on the services of the network, however MANET are vulnerable to attacks due to it’s dynamic, nomadic and open environment. However, network is vulnerable to the attacks by presence of malicious nodes. DOS and Black Hole attacks are two security threats in AODV.DOS attacks aims to disrupt the service provided by network or server by continuously sending unwanted packets using malicious node. In Black hole attack, the aim of this attack to capture the path and send fake route reply message and routing information. So to overcome from these consequences we propose an algorithm which introduce a mechanism of DOS and Black hole attacks prevention and check network performance in malicious environment on the analysis of throughput and end to end delay.


Denial of service (DOS) Black hole attack AODV MANET 


  1. 1.
    Ismail, I.I., Jaafar, M.H.F.: Mobile ad hoc network overview. In: Proceedings of Asia-Pacific Conference on Applied Electromagnetics (2014)Google Scholar
  2. 2.
    Yau, P.-W., Hu, S., Mitchell, C.J.: Malicious attacks on ad hoc network routing protocolsGoogle Scholar
  3. 3.
    Mishra, A., Nadkarni, K.M.: Security in wireless ad hoc network. In: The Hand Book of Ad Hoc Wireless Network. CRC Press Inc., Boca Raton (2003)Google Scholar
  4. 4.
    Kumar, V., Sharma, R., Kush, A.: Effect of malicious nodes on AODV in mobile ad hoc networks. Int. J. Comput. Sci. Manage. Res. 1(3), 395 (2012)Google Scholar
  5. 5.
    Michiardi, P., Molva, R.: CORE: A Collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP TC6/TC11 Sixth Joint Working Conference of Communication and Multimedia Security (2002)Google Scholar
  6. 6.
    Al-Omari, S.A.K., Sumari, P.: An overview of mobile ad hoc networks for the existing protocols and application. J. Appl. Graph Theory Wireless Ad-hoc Netw. Sens. Netw 2(1), 87 (2010)Google Scholar
  7. 7.
    Sheikhl, R., Chandee, M.S., Mishra, D.K.: Security issues in MANET: a review. In: 7th International Conference on Wireless and Optical Communications Networks (2010)Google Scholar
  8. 8.
    Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2 (2009)Google Scholar
  9. 9.
    Gambhir, S., Sharma, S.: PPN: prime product number based malicious node detection scheme for MANETSGoogle Scholar
  10. 10.
    Sheikhl, R., Chandee, M.S., Mishra ,D.K.: Security issues in MANET: a review. In: IEEE, pp. 1–4, Sept 2010. ISBN 978-1-4244-7203-1Google Scholar
  11. 11.
    Dr. Tamilarasan, S.: Securing and Preventing AODV routing protocol from black hole attack using counter algorithm. Int. J. Eng. Res. Technol. (IJERT) 1(5) (2012)Google Scholar
  12. 12.
    Akanksha Saini, Harish Kumar : Effect of black hole attack on AODV routing protocol In MANET. IJCST 1(2) (2010)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Anurag Gupta
    • 1
  • Bhupendra Patel
    • 2
  • Kamlesh Rana
    • 1
  • Rahul Pradhan
    • 3
  1. 1.CSE DepartmentGalgotias College of Engineering and TechnologyGreater NoidaIndia
  2. 2.CSE DepartmentDr. Jivraj Mehta Institute of TechnologyMogar, AnandIndia
  3. 3.CSE DepartmentGLA UniversityMathuraIndia

Personalised recommendations