Enhanced AODV Protocol for Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2017, Vol 16, Issue 1
Abstract
Mobile Ad-hoc Network (MANET) is a kind of wireless network that has the most challenging network infrastructure. It is formed using the mobile nodes without any centralized administration from the security perspective and is a self-configuring fastest emerging wireless technology, each node on the MANET will act like a router which forwards the packets. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among a pair of nodes. Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (ADOV) is a reactive MANET routing protocols. Most of the attacks on MANETs are routing protocol attacks. Attacks on routing protocols, especially internal attacks will cause the damage to MANETs. Sinkhole and black hole attacks are a type of internal attack which is affected by attempting to draw all network traffic to malicious nodes that fake routing update and degrade the performance of the network. The black hole nodes should be detected from the network as early as possible via detection mechanism and should also guarantee the higher detection rate and less cross-over error rate. In this paper, we studied the characteristics of black hole attack and how it will affect the performance of the distance vector routing on demand routing protocol such as (ADOV) protocol, which recognizes the presence of black hole node from packet flow information between nodes and isolates it from the network via applying AODV protocol that one of popular routing protocol. We have evaluated the performance of the system using widely used simulator NS2, results prove the effectiveness of our prevention and detection method.
Authors and Affiliations
Sherin Hijazi, Mahmoud Moshref, Saleh Al-Sharaeh
Technological Approaches in Applied Social learning
Industry 4.0 covers the readiness of achieving expertise that impacts the society, strategy, talent and technology. Individual, social and economic demands pose ever-changing challenges for education and training even in...
Visualizing text similarities from a graph-based SOM
Text in articles is based on expert opinion of a large number of people including the views of authors. These views are based on cultural or community aspects, which make extracting information from text very difficult....
Vehicular Traffic Monitoring Using VANET
During last few years, continuous progresses in wireless communication have open new research fields in computer network. VANET proposes communication between vehicles by wireless means has a large potential to improve s...
AN EFFECTIVE USAGE PARAMETER CONTROL MODEL FOR CELL POLICING IN ATM NETWORKS
The primary role of traffic control procedures is to protect the network so that it can achieve the required network performance objectives and yield a high quality of service (QoS). To guarantee the QoS, the network imp...
Cost Analysis and Simulation of Decimator for Multirate Applications
In this paper, a decimator design has been presented for multirate digital signal processing.  The decimator design has been analysed and simulated for cost comparison in terms of multipliers and MPIS. Two structures  ...