A Literature Review on Black Hole Attacks on AODV Protocol in MANET
International Journal of Engineering Trends and Technology (IJETT) | |
|
© 2016 by IJETT Journal | ||
Volume-38 Number-1 |
||
Year of Publication : 2016 | ||
Authors : Rahul singh, Anurag Uphdaya |
||
DOI : 10.14445/22315381/IJETT-V38P209 |
Citation
Rahul singh, Anurag Uphdaya"A Literature Review on Black Hole Attacks on AODV Protocol in MANET", International Journal of Engineering Trends and Technology (IJETT), V38(1),44-49 August 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
A Mobile ad-hoc network (MANET) is research area with practical applications. The reason behind the fame of MANET is flexibility and independence of network infrastructure. MANET have some inimitable characteristic like dynamic network topology, limited power and limited bandwidth for communication. MANET has more challenge compare to any other conservative network. Routing plays an important role in the security of the whole network. The most common routing protocols used in ad-hoc network are AODV (ad-hoc on demand distance vector) protocol. AODV protocol is susceptible by “Black Hole” attack. In black hole attack a malicious node advertise itself as have the shortest path to the destination node. In this paper we study the routing security issue of MANET and analyze in detail one type of attack the “Black hole” attack. We also present a detailed list of solutions which protect the black hole in MANET’s.
References
[1] C. Perkins, Ad Hoc Networks, Addison-In this papersley, 2001.
[2] S. Ci et al., “Self-Regulating Network Utilization in Mobile Ad-Hoc Wireless Networks,”IEEE Trans. Vehic. Tech., vol. 55, no. 4, July 2006, pp. 1302–10.
[3] M. Zapata, Secure Ad Hoc On-Demand Distance Vector (SAODV). Internet draft, draft-guerrero-manet-saodv-01.txt, 2002.
[4] Y. Hu, A. Perrig, and D. Johnson, Ariadne: A Secure On- Demand Routing for Ad Hoc Networks. Proc. of MobiCom 2002, Atlanta, 2002.
[5] Y. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing. IEE Security & Privacy, pp. 28-39, 2004.
[6] B. Ain this paperrbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, 2002.
[7] Y. Hu, A Perrig, and D. Johnson, Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks. Proc. of IEEE INFORCOM, 2002.
[8] K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002
[9] C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc Ondemand Distance Vector (AODV) Routing,” IETF RFC 3561, July 2003.
[10] Deng H., Li W. and Agrawal, D.P., "Routing securi ty in wireless ad hoc networks," Communications Magazine, IEEE, vol.40, no.10, pp. 70- 75, October 2002.
[11] Mohammad Al-Shurman et. Al” Black Hole Attack in Mobile Ad-Hoc Network” ACMSE’04, Apri l 2-3, 2004, Huntsville, AL, USA.
[12] Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipthey, and Yoshiaki Nemoto, “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Jtheynal of Network Securi ty, Vol.5, Issue 3, pp: 338–346, 2007
[13] Latha Tamilselvan, V. Sankaranarayanan, “Prevention of Co-operative Black Hole Attack in MANET”, Journal of Networks, Vol 3, No 5, 13-20, May 2008
[14] Zhao Min; Zhou Jiliu, "Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks", Information Engineeri ng and Electronic Commerce, 2009. IEEC `09.International Symposium on, vol., no., pp.26-30, 16-17 May 2009.
[15] XiaoYang Zhang; Sekiya, Y.; Wakahara, Y., "Proposal of a method to detect black hole attack in MANET," Autonomous Decentralized Systems, 2009. ISADS `09. International Symposium on, vol., no., pp.1-6, 23-25 March 2009.
[16] Payal N. Raj1 and Prashant B. Swadas2, “DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET”, IJCSI International Jtheynal of Computer Science Issues, Vol. 2, 2009.
[17] Alem, Y.F.; Zhao Cheng Xuan; , "Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection," Future Computer and Communication (ICFCC), 2010 2nd
[18] Ming-Yang Su, “Prevention of Selective Black hole Attacks on Mobile Ad hoc Network through Intrusion Detection Systems”, Computer Communications, 2010. Communications, 2007, pp. 21-26.
[19] Lalit Himral, Vishal Vig, Nagesh Chand, “Preventing AODV Routing Protocol from Black Hole Attack” International Jtheynal of Engineeri ng Science and Technology (IJEST) Vol. 3 No. 5 May 2011.
[20] Kamarulari fin Abd. Jalil, Zaid Ahmad, Jamalul-Lail Ab Manan, “Mitigation of Black Hole Attacks for AODV Routing Protocol”, Society of Digital Information and Wireless Communications (SDIWC) Vol01_No02_30, 2011.
[21] Kitisak Osathanunkul and Ning Zhang” A Countermeasure to Black Hole Attacks in Mobile Ad hoc Networks” 978-1- 4244-9573-3/11/$26.00 ©2011 IEEE.
[22] Seryvuth Tan and Keecheon Kim “Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs”978-0-7695-5088-6/13 © 2013 IEEE.
[23] Gayatri Wahane, Ashok M. Kanthe and Dina Simunic “Detection of Cooperative Black Hole Attack using Crosschecking with TrueLink in MANET” 978-1-4799-3975- 6/14/$31.00 ©2014 IEEE.
[24] Apurva Jain and Anshul Shrotriya “Investigating the Effects of Black Hole Attack in MANET under Shadowing Model with Different Traffic conditions” IEEE International Conference on Computer, Communication and Control (IC4- 2015).
Keywords
MANET, Security, Black hole attack, AODV and Packet dropping.