A Review of Black Hole and Worm Hole Attack on AODV Routing Protocol in MANET
Citation
Ms. Ankita M.Shendurkar , Prof. Nitin R.Chopde. "A Review of Black Hole and Worm Hole Attack on AODV Routing Protocol in MANET", International Journal of Engineering Trends and Technology (IJETT), V9(8),394-399 March 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
The wireless mobile Ad-hoc network (MANET) is self-configuring mobile nodes connected through the wireless links with the decentralized networks where the nodes communicate with each other on the basis of mutual trust. For the network design, nature of the MANETs brings a new security challenges. Due to the dynamic infrastructure less nature and decentralized networks, wireless Ad-hoc networks are unprotected and vulnerable to the attack. In black hole attack, by sending false routing reply to the all nodes, malicious node advertises itself as having the shortest path. In Wormhole attack, a pair of attackers creates the tunnels to transfer the data packets from one end to another end by corrupting it. These attacks can affect the performance of the different routing protocol. This paper focuses on the study of the wormhole attack and black hole attack on AODV routing protocol.
References
[1] J. Gronkvist, A. Hansson, and M. Skold, “Evaluation of a Specification-Based Intrusion Detection System for AODV”. 2007.
[2] S. Kurosawa, H. Nakayama, and N. Kato, “Detecting black hole attack on AODV based mobile ad-hoc networks by dynamic learning method,” International Journal of Network Security, pp. 338–346, 2007.
[3] West off, D., Paul K, “Context Aware Detection of Selfish Nodes in DSR based Ad Hoc Networks”, IEEE GLOBECOM. Taipei, Taiwan, pp. 178-182, 2002.
[4] Gurpreet Kaur, Er. Sandeep Kaur Dhanda, “Analyzing the effect of Wormhole Attack on Routing Protocol in Wireless Sensor Network”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013
[5] C.E. Perkins and E.M. Royer. “Ad-hoc on-demand distance vector routing”. In Second IEEE Workshop on Mobile Computing System and Application, WMCSA 99, pages 90 –100, Feb. 1999
[6] Y.F.Alem, Z.C.Xuan, “Preventing Wormhole Attack in Mobile Ad-hoc Networks Using Anomaly Detection”, 2nd International Conference on Future Computer and Communication (ICFCC 2010), Vol. 3, pp. 672-676, May, 2010.
[7]. M.Parsons, P.Ebinger, “Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc Networks” April. 10, 2010.
[8] M Al-Shurman, S-M Yoo and S. Park, “Black Hole Attack in Mobile Ad Hoc Networks”, ACM Southeast Regional Conf, 2004.
[9] Y.-C. Hu, D. B. Johnson, and A. Perrig, “Secure efficient distance vector routing for mobile wireless ad-hoc networks,” Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002.
[10] C.Jiwen, Y.Ping, C.Jialin, W.Zhiyang, L.Ning, “ An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network”,24th IEEE International Conference on Advance Information Networking and Application (AINA 2010), pp. 775-780, April,2010.
[11] J. W. Creswell,” Research Design: Qualitative, Quantitative and Mixed Methods Approach”, 2nd Ed, Sage Publications Inc, California, July 2002.
[12] P.A.R Kumar, S.Selvakumar, “Distribute Denial-of- Service (DDoS) Threat in Collaborative Environment A survey of DDoS Attack Tools and Traceback Mechanism”, IEEE International Advance Computing Conference (IACC 2009), pp. 1275-1280, March, 2009.
[13] Kamini, Rakesh K “VANET Parameters and Applications: A Review”, Global Journal of Computer Science and Technology, September 2010.
[14] C.E. Perkins and E.M. Royer “Ad-Hoc on-Demand Distance Vector Routing,” Proc. of IEEE Workshop Mobile Computing Systems and Applications, pp 90-100, 1999.
[15] Dokurer, Semih “Simulation of Black hole attack in wireless Ad-Hoc networks”, Master’s thesis, Atihm University, September 2006.
[16] Santoshi Kurosawal, hidehisa, Nakayama, Nei Kato, Abbas, Jamalipour and Yoshiaki, Nemoto. “Detecting Black hole Attack on AODV based Mobile Ad Hoc Networks by Dynamic Learning Method” in International Journal of Network Security, Vol.5, No.3, pp.338-346, Nov.2007.
[17] Rashid Hafeez Khokhar, Md Asri Ngadi and Satira Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, pp. 18-29, Volume-2 Issue-3, 2009.
Keywords
MANET; AODV Routing Protocol; Black hole and Worm hole attack.