An Effective Strategy to Defense Black Hole Attack Based on AODV Routing Protocol

被引:0
|
作者
Chen, Xiaoyun [1 ]
Yao, Yukai [1 ]
Liu, Guohua [1 ]
Li, Longjie [1 ]
机构
[1] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou 730000, Peoples R China
关键词
Wireless Ad Hoc Network; Routing Protocol; AODV; Network Security; Black hole Attack; NS2;
D O I
10.4028/www.scientific.net/AMM.40-41.457
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile Ad hoc Network (MANET) has attracted lots of research efforts these years, mainly due to its appealing applications in no infrastructure situations such as battle fields and disaster recovery operations([1]). In this paper, we explore wireless Ad Hoc network focusing on its Routing Protocol AODV, we in depth analyze its operation principles and the problems exist in AODV routing protocol. AODV routing protocol is vulnerable, it is always exposed to many attacks, such as DoS, black hole, etc.([2]) Through exhaustive researching the behaviors of black hole attack in NS2 simulation platform, and we finally propose a new routing security strategy to defense the black hole attack in AODV. Simulation results show that the strategy we proposed can not only effectively defense the black hole nodes, but also has better routing performance for moderate or small scale Ad Hoc Networks.
引用
收藏
页码:457 / 461
页数:5
相关论文
共 50 条
  • [41] Mitigate Black Hole Attack using Trust with AODV in MANET
    Keerthika, V.
    Malarvizhi, N.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 470 - 474
  • [42] Improved AODV Performance in DOS and Black Hole Attack Environment
    Gupta, Anurag
    Patel, Bhupendra
    Rana, Kamlesh
    Pradhan, Rahul
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 2, 2015, 32 : 541 - 549
  • [43] An improved routing protocol Ad-AODV Based on AODV
    Feng, Zuhong
    Wang, Long
    Gao, Xiujuan
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMPUTER APPLICATIONS (ICSA 2013), 2013, 92 : 95 - 101
  • [44] A Modified Approach for Recognition and Eradication of Extenuation of Gray-Hole Attack in MANET using AODV Routing Protocol
    Kumar, Sudheer
    Doohan, Nitika Vats
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [45] Optimization Strategy for AODV Routing Protocol Based on Modified Ant Colony Algorithm
    Hu, Weihua
    Li, Yuanzhou
    [J]. ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 34 - 41
  • [46] Optimization Strategy for Mobile Ad Hoc Network Based on AODV Routing Protocol
    Li Yuanzhou
    Hu Weihua
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [47] Preventing Black Hole Attack in AODV using Timer-Based Detection Mechanism
    Choudhary, Nidhi
    Tharani, Lokesh
    [J]. 2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2015, : 1 - 4
  • [48] Effect of Pause Time on AODV and TSDRP Routing Protocols Under Black Hole Attack and DoS Attacks in MANETs
    Chaubey, Nirbhay
    Aggarwal, Akshai
    Gandhi, Savita
    Jani, Keyurbhai A.
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1807 - 1812
  • [49] Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm
    Kumar, Ankit
    Varadarajan, Vijayakumar
    Kumar, Abhishek
    Dadheech, Pankaj
    Choudhary, Surendra Singh
    Kumar, V. D. Ambeth
    Panigrahi, B. K.
    Veluvolu, Kalyana C.
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [50] Evaluation of MANET Routing Protocols under Black Hole Attack Using AODV and OLSR in NS3
    Nabou, Abdellah
    Laanaoui, My Driss
    Ouzzif, Mohammed
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 122 - 127