Analysis of Possible Attack on AODV Protocol in MANET

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-11 Number-6
Year of Publication : 2014
Authors : Nitesh Funde , P. R. Pardhi


Nitesh Funde , P. R. Pardhi. "Analysis of Possible Attack on AODV Protocol in MANET", International Journal of Engineering Trends and Technology (IJETT), V11(6),306-309 May 2014. ISSN:2231-5381. published by seventh sense research group


Mobile Ad Hoc Networks (MANETs) consist of wireless mobile nodes which coordinate with each other to form temporary network without its pre-existing infrastructure. AODV is popular Ad-hoc distance vector routing reactive protocol which is used to find correct & shortest route to destination. Due to openness, dynamic, infrastructure-less nature, MANET are vulnerable to various attacks. One of these possible attacks is a Black Hole Attack in which a mobile node falsely replies to the source node that it is having a shortest path to the destination without checking its routing table. Therefore source node send all of its data to the black hole node and it deprives all the traffic of the source node. In this paper, We are proposing a technique to detect and prevent the multiple black hole nodes from MANET so that source to destination communication can be made easily. We also analysed the performance of the network in terms of number of packets sent, received, throughput, energy of network before attack and after detection & prevention of Attack. From these analysis, we can conclude that performance decreased due to attack can be improved after detection & prevention black hole attack in MANET.


[1] C. Perkins. “(RFC) request for Comments-3561”, Category: Experimental, Network, Working Group, July 2003
[2] Ebrahim Mohamad, Louis Dargin. “Routing Protocols Security.” In: Ad Hoc Networks”. A Thesis at Oakland University School .
[3] Dokurer,Seimih “Simulation of Black hole Attackin wireless ad-hoc Networks” Master’s Thesis Atihm University, Septeber 2006 .
[4] Deng H., Li W. and Agrawal, D.P., "Routing security wireless ad hoc networks," Communications Magazine, IEEE, (2002) The IEEE website.
[5] Alem, Y.F.; Zhao Cheng Xuan; , "Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection
[6] A survey of black hole attacks in wireless mobile ad hoc networks Fan-Hsun Tseng Li-Der Chou and Han-Chieh Chao
[7] Nital Mistry, Devesh C Jinwala, Mukesh Zaveri, “Improving AODV Protocol against Blackhole Attacks”, proceedings the International Multi Conference of Engineers and Computer Scientists 2010 Vol II, IMECS 210

AODV, black hole, RREQ, RREP, RERR