Prevention of Black hole Attack on AODV in MANET using hash function

被引:0
|
作者
Aware, Anand A. [1 ]
Bhandari, Kiran [1 ]
机构
[1] Univ Mumbai, Thakur Coll Engn & Technol, Dept Comp Engn, Bombay, Maharashtra, India
关键词
Black hole; Cooperative Black hole; gray hole; AODV; MANET;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc networks (MANET) are acquiring popularity today, as it offers wireless connectivity to the users irrespective of their geographical position. An ad-hoc network does not have a centralized infrastructure. It is a wireless network where nodes communicate with each other through multiple hops. If the nodes in the ad-hoc network change their positions dynamically, it is called a mobile ad-hoc network (MANET). It has characteristics like shared physical medium, autonomous terminal, limited physical security, infrastructure less communication, Dynamic topology, large degree of freedom, self organizing capability. Such characteristics provide an open environment for users to maintain connectivity irrespective of their geographical positions but, such types of networks are vulnerable to various kinds of attack. Ad hoc on demand Distance Vector (AODV) is one of the key protocols used for routing in MANET. The security of AODV protocol can be shattered by black hole attack. A Black hole attack can devastate routing in mobile ad hoc network. A Black hole is a malevolent node that proclaims to have the shortest optimal path to the desired destination node but in reality it does not have any active path to particular destination and the packets received by the black hole from other nodes are dropped. As the black hole attack gives the fake shortest path to the destination hence in our proposed scheme, the first optimal path is discarded and the second optimal route is selected. To maintain data integrity and for prevention of black / gray hole attack hash function is used.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Combat with Black Hole Attack in AODV Routing Protocol
    Medadian, Mehdi
    Mebadi, Ahmad
    Shahri, Elham
    [J]. 2009 IEEE 9TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2009, : 530 - 535
  • [42] Detection of Cooperative Black Hole Attack using Crosschecking with TrueLink in MANET
    Wahane, Gayatri
    Kanthe, Ashok M.
    Simunic, Dina
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 205 - 210
  • [43] Evaluation of black hole attack with avoidance scheme using AODV protocol in VANET
    Kumar, Manish
    Jain, Vanita
    Jain, Achin
    Bisht, Uttam Singh
    Gupta, Neha
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (02): : 277 - 291
  • [44] WADP: A Wormhole Attack Detection And prevention Technique in MANET using Modified AODV routing Protocol
    Biswas, Juhi
    Gupta, Ajay
    Singh, Dayashankar
    [J]. 2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 366 - +
  • [45] Honeypot Based Black-Hole Attack Confirmation in a MANET: Black-Hole Attack Confirmation
    Tiruvakadu D.S.K.
    Pallapa V.
    [J]. International Journal of Wireless Information Networks, 2018, 25 (4) : 434 - 448
  • [46] Proposal of a Method to Detect Black Hole Attack in MANET
    Zhang, XiaoYang
    Sekiya, Yuji
    Wakahara, Yasushi
    [J]. ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 149 - 154
  • [47] Technique for Detection of Cooperative Black Hole Attack in MANET
    Wahane, Gayatri
    Lonare, Savita
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [48] Detection of Single and Collaborative Black Hole Attack in MANET
    Sathish, M.
    Arumugam, K.
    Pari, S. Neelavathy
    Harikrishnan, V. S.
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 2040 - 2044
  • [49] Detection As Well As Removal Of Black hole And Gray hole Attack In MANET
    Sharma, Neha
    Bisen, Anand Singh
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3736 - 3739
  • [50] Identifying and detecting black hole and gray hole attack in MANET using gray wolf optimization
    Vatambeti, Ramesh
    Supriya, Kola Sangeetha
    Sanshi, Shridhar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (18)