An Effective Strategy to Defense Black Hole Attack Based on AODV Routing Protocol

被引:0
|
作者
Chen, Xiaoyun [1 ]
Yao, Yukai [1 ]
Liu, Guohua [1 ]
Li, Longjie [1 ]
机构
[1] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou 730000, Peoples R China
关键词
Wireless Ad Hoc Network; Routing Protocol; AODV; Network Security; Black hole Attack; NS2;
D O I
10.4028/www.scientific.net/AMM.40-41.457
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile Ad hoc Network (MANET) has attracted lots of research efforts these years, mainly due to its appealing applications in no infrastructure situations such as battle fields and disaster recovery operations([1]). In this paper, we explore wireless Ad Hoc network focusing on its Routing Protocol AODV, we in depth analyze its operation principles and the problems exist in AODV routing protocol. AODV routing protocol is vulnerable, it is always exposed to many attacks, such as DoS, black hole, etc.([2]) Through exhaustive researching the behaviors of black hole attack in NS2 simulation platform, and we finally propose a new routing security strategy to defense the black hole attack in AODV. Simulation results show that the strategy we proposed can not only effectively defense the black hole nodes, but also has better routing performance for moderate or small scale Ad Hoc Networks.
引用
收藏
页码:457 / 461
页数:5
相关论文
共 50 条
  • [1] Combat with Black Hole Attack in AODV Routing Protocol
    Medadian, Mehdi
    Mebadi, Ahmad
    Shahri, Elham
    [J]. 2009 IEEE 9TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2009, : 530 - 535
  • [2] REMOVAL OF BLACK HOLE ATTACK IN AODV ROUTING PROTOCOL OF MANET
    Chavda, Ketan S.
    Nimavat, Ashish V.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [3] Black Hole Attack-Hazard To AODV Routing Protocol In Manet
    Chavda, Ketan Sureshbhai
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (10): : 92 - 97
  • [4] Performance Evaluation of AODV routing Protocol under Black Hole attack with varying Black hole nodes
    [J]. 2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [5] QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack
    Bar, Radha Krishna
    Mandal, Jyotsna Kumar
    Singh, Moirangthem Marjit
    [J]. FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 530 - 537
  • [6] Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack
    Chavan, A. A.
    Kurule, D. S.
    Dere, P. U.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 835 - 844
  • [7] Impact of black hole and gray hole attack in AODV protocol
    20144600188160
    [J]. (1) Department of Computer Science and Engineering, Thapar University, Patiala, India, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [8] Impact Of Black Hole And Gray Hole Attack In AODV Protocol
    Chadha, Kriti
    Jain, Sushma
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [9] Modified AODV Routing Protocol to Improve Security and Performance against Black Hole Attack
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [10] Detection of black hole attack in enhanced AODV protocol
    Vadavi, J. V.
    Sugavi, Ashwini G.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 119 - 124