Full Paper View Go Back

Reduce Impact Blackhole Attack in AODV Protocol

Z. Sh Alnadhery1 , S. M. Baneamoon2

1 Dept. of IT, College of Engineering & Information Technology, AL Rayan University, Hadhramout, Yemen.
2 Dept. of Computer Engineering, College of Engineering & Petroleum, College of Computers & IT, Hadhramout University, Hadhramout, Yemen.

Section:Research Paper, Product Type: Journal
Vol.8 , Issue.2 , pp.1-7, Apr-2020

Online published on May 14, 2020


Copyright © Z. Sh Alnadhery, S. M. Baneamoon . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Z. Sh Alnadhery, S. M. Baneamoon, “Reduce Impact Blackhole Attack in AODV Protocol,” International Journal of Scientific Research in Network Security and Communication, Vol.8, Issue.2, pp.1-7, 2020.

MLA Style Citation: Z. Sh Alnadhery, S. M. Baneamoon "Reduce Impact Blackhole Attack in AODV Protocol." International Journal of Scientific Research in Network Security and Communication 8.2 (2020): 1-7.

APA Style Citation: Z. Sh Alnadhery, S. M. Baneamoon, (2020). Reduce Impact Blackhole Attack in AODV Protocol. International Journal of Scientific Research in Network Security and Communication, 8(2), 1-7.

BibTex Style Citation:
@article{Alnadhery_2020,
author = {Z. Sh Alnadhery, S. M. Baneamoon},
title = {Reduce Impact Blackhole Attack in AODV Protocol},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2020},
volume = {8},
Issue = {2},
month = {4},
year = {2020},
issn = {2347-2693},
pages = {1-7},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=386},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=386
TI - Reduce Impact Blackhole Attack in AODV Protocol
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Z. Sh Alnadhery, S. M. Baneamoon
PY - 2020
DA - 2020/05/14
PB - IJCSE, Indore, INDIA
SP - 1-7
IS - 2
VL - 8
SN - 2347-2693
ER -

661 Views    453 Downloads    322 Downloads
  
  

Abstract :
One of the most famous technologies in the networks is MANET technology, which is used in medical, military and other fields. MANET is a group of nodes that connect between them without the access point. AODV protocol is not provided with protection mechanisms because the primary purpose of this protocol is to quickly deliver packets to the destination. This is the main reason for its being attacked by malicious nodes. One of these attacks is a blackhole attack where the malicious node sends a fake message to the source that the shortest path to the destination passes through this malicious node. Then, the packets are dropped, which reduces the effectiveness and performance of AODV. In this paper, we proposed a SPAODV method to protect from blackhole attack and reduce its impact. In the SPAODV method, after the source node receives an RREP message, CHECKVERIFY will be sent to all proposed routes to confirm the route to the destination by the source node. The desired destination is the only node that can confirm the validity of the path by sending VERIFY to the source. Results of simulation by using NS2 showed that the SPAODV method better protection and better performance in AODV under blackhole attack networks compared to an EAODV method and a MAODV method.

Key-Words / Index Term :
AODV, SPAODV, Blackhole attack, Routing Overhead, NS2.

References :
[1] D. Gorine and R. Saleh, “Performance Analysis of Routing Protocols in MANET Under Malicious Attacks,” International Journal of Network Security & Its Applications (IJNSA), Vol.11, No.2, pp.1-12, 2019.
[2] A. R. Mahlous, “The Effectiveness of Mobile Ad Hoc Routing Protocols Under a Gray Hole Attack,” International Journal on Information Technologies & Security, Vol.11, No.1, 2019.
[3] R. Kumari, P. Nand, “Performance Analysis of Existing Routing Protocols,” Int. Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.47-50, 2017.
[4] Ch. Panos, Ch. Ntantogian, S. Malliaros and Ch. Xenakis, “Analyzing, Quantifying, and Detecting the Blackhole Attack in Infrastructure-less Networks,” Computer Networks, Vol.113, pp.94-110, 2016.
[5] A. ِA. Chavan, D. S. Kurule and P. U. Der, “Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Blackhole Attack,” In the Procedia Computer Science, Vol.79, pp. 835-844, 2016.
[6] R. Rana and R. Kumar, “Performance Analysis of AODV in Presence of Malicious Node,” Acta Electronica Malaysia (AEM), Zibeline International Publishing, Vol.3, No.1, pp.1-5, 2019.
[7] M. Salehi, A. Boukerche and A. Darehshoorzadeh, “Modeling and Performance Evaluation of Security Attacks on Opportunistic Routing Protocols for Multihop Wireless Networks,” Ad Hoc Networks, Vol.50, pp.88-101, 2016.
[8] S. Ali, “Enhanced Virtual Private Network Authenticated Ad Hoc on Demand Distance Vector Routing,” International Journal of Innovative Engineering and Management Research, Vol.7, Issue.12, pp.190-197, 2018.
[9] M. Ebrahimi and S. Jamali, “Securing AODV Routing Protocol Against the Blackhole Attack Using Firefly Algorithm,” International Journal of Applied Operational Research, Vol.6, No.4, pp.53-64, 2016.
[10] A. Sharma and P.K. Johari, “Eliminating Collaborative Blackhole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.34-41, 2017.
[11] T. Delkesh and M. A. Jamali, “EAODV: Detection and Removal of Multiple Blackhole Attacks Through Sending Forged Packets in MANETs,” Journal of Ambient Intelligence and Humanized Computing, Vol.10, No.5, pp.1897-1914, 2018.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation