Prevention of DOS and Black Hole Attack in AODV

Abstract

Mobile Ad Hoc Network (MANET) is a self-configuring, gathering of wireless devices and infrastructure-less network technology used to create a wireless network without wire using mobile nodes. In MANET all devices are free to move independently in any direction so they change their links to other devices frequently. Its performance is based on the services of the network; however MANET’s are vulnerable to the attacks due to its dynamic topology, nomadic and open environment. However, network is vulnerable to the outside attacks by presence of malicious nodes. Therefore, MANET Networks are vulnerable because of its dynamic, nomadic and open operational environment. There are two security threats in an AODV such as DOS and Black Hole attacks. DOS attack is one of the server security scourges in an ad hoc networks aims to disrupt the services provided by network or the server by continuously sending unwanted packets using malicious node. The malicious nodes are the type of mobile nodes but it is different to normal mobile nodes as like change or removes routing information, send a fake route request to the server. The Black Hole attack captures the path and sends’s fake route reply message and routing information. So to overcome from these consequences we are proposing an algorithm which introduces a mechanism of Dos and Black Hole Attacks (BHA) prevention and check network performance in the malicious environment. Throughput and end to end delay are also analyzed.

Authors and Affiliations

Sachin Gupta, Harsha Chawla

Keywords

Related Articles

Simulation based performance of AODV (Reactive) and DSDV (Proactive) routing protocol for MANET

Mobile Ad hoc network which runs on battery power and is the major source of entire nodes, the entire network and network lifetime [14] is dependent on that battery power, if any of the node present in the network runs...

Physicochemical Study of Ground Water of Shahdol City (Madhya Pradesh) With Special Reference to Status of WQI

Water is one of the most indispensable resources and known for the elixir of life. It is believed that groundwater must possess degree of purity free from chemical contamination and micro-organisms. Groundwater is the m...

Advanced Low Power CMOS Design to Reduce Power Consumption in CMOS Circuit for VLSI Design

Low power has emerged as a principal theme in today's electronic industry. Energy efficiency is one of the most critical features of modern electronic systems designed for high speed and portable applications. Reduction...

Partial Replacement of Waste Foundry Sand and Recycled Aggregate in Concrete

Low cost concrete production by replacement of fine sand with Foundry sand is a new trend and makes effectively use of Waste foundry sand as engineering material by reducing disposal and pollution problem. Waste foundry...

Securing Guest Virtual Machine By Using Software And Hardware Processor

With rapid development on cloud computing, securing guest virtual machines (VMs) from malicious user has become critical to provide secure services. Today’s cloud security model is based up on the software based virtual...

Download PDF file
  • EP ID EP22106
  • DOI -
  • Views 156
  • Downloads 5

How To Cite

Sachin Gupta, Harsha Chawla (2016). Prevention of DOS and Black Hole Attack in AODV. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(5), -. https://europub.co.uk/articles/-A-22106