Reduce Impact Blackhole Attack in AODV Protocol

Authors

  • Z. Sh Alnadhery Dept. of IT, College of Engineering & Information Technology, AL Rayan University, Hadhramout, Yemen
  • S. M. Baneamoon Dept. of Computer Engineering, College of Engineering & Petroleum, College of Computers & IT, Hadhramout University, Hadhramout, Yemen

Keywords:

AODV, SPAODV, Blackhole attack, Routing Overhead, NS2

Abstract

One of the most famous technologies in the networks is MANET technology, which is used in medical, military and other fields. MANET is a group of nodes that connect between them without the access point. AODV protocol is not provided with protection mechanisms because the primary purpose of this protocol is to quickly deliver packets to the destination. This is the main reason for its being attacked by malicious nodes. One of these attacks is a blackhole attack where the malicious node sends a fake message to the source that the shortest path to the destination passes through this malicious node. Then, the packets are dropped, which reduces the effectiveness and performance of AODV. In this paper, we proposed a SPAODV method to protect from blackhole attack and reduce its impact. In the SPAODV method, after the source node receives an RREP message, CHECKVERIFY will be sent to all proposed routes to confirm the route to the destination by the source node. The desired destination is the only node that can confirm the validity of the path by sending VERIFY to the source. Results of simulation by using NS2 showed that the SPAODV method better protection and better performance in AODV under blackhole attack networks compared to an EAODV method and a MAODV method.

 

References

D. Gorine and R. Saleh, “Performance Analysis of Routing Protocols in MANET Under Malicious Attacks,” International Journal of Network Security & Its Applications (IJNSA), Vol.11, No.2, pp.1-12, 2019.

A. R. Mahlous, “The Effectiveness of Mobile Ad Hoc Routing Protocols Under a Gray Hole Attack,” International Journal on Information Technologies & Security, Vol.11, No.1, 2019.

R. Kumari, P. Nand, “Performance Analysis of Existing Routing Protocols,” Int. Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.47-50, 2017.

Ch. Panos, Ch. Ntantogian, S. Malliaros and Ch. Xenakis, “Analyzing, Quantifying, and Detecting the Blackhole Attack in Infrastructure-less Networks,” Computer Networks, Vol.113, pp.94-110, 2016.

A. ِA. Chavan, D. S. Kurule and P. U. Der, “Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Blackhole Attack,” In the Procedia Computer Science, Vol.79, pp. 835-844, 2016.

R. Rana and R. Kumar, “Performance Analysis of AODV in Presence of Malicious Node,” Acta Electronica Malaysia (AEM), Zibeline International Publishing, Vol.3, No.1, pp.1-5, 2019.

M. Salehi, A. Boukerche and A. Darehshoorzadeh, “Modeling and Performance Evaluation of Security Attacks on Opportunistic Routing Protocols for Multihop Wireless Networks,” Ad Hoc Networks, Vol.50, pp.88-101, 2016.

S. Ali, “Enhanced Virtual Private Network Authenticated Ad Hoc on Demand Distance Vector Routing,” International Journal of Innovative Engineering and Management Research, Vol.7, Issue.12, pp.190-197, 2018.

M. Ebrahimi and S. Jamali, “Securing AODV Routing Protocol Against the Blackhole Attack Using Firefly Algorithm,” International Journal of Applied Operational Research, Vol.6, No.4, pp.53-64, 2016.

A. Sharma and P.K. Johari, “Eliminating Collaborative Blackhole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.34-41, 2017.

T. Delkesh and M. A. Jamali, “EAODV: Detection and Removal of Multiple Blackhole Attacks Through Sending Forged Packets in MANETs,” Journal of Ambient Intelligence and Humanized Computing, Vol.10, No.5, pp.1897-1914, 2018.

Downloads

Published

2020-04-30

How to Cite

[1]
Z. S. Alnadhery and S. M. Baneamoon, “Reduce Impact Blackhole Attack in AODV Protocol”, Int. J. Sci. Res. Net. Sec. Comm., vol. 8, no. 2, pp. 1–7, Apr. 2020.

Issue

Section

Research Article

Similar Articles

<< < 1 2 3 4 5 

You may also start an advanced similarity search for this article.