BLACK HOLE ATTACK IN NETWORK USING AODV ROUTING PROTOCOL ON NS2: A REVIEW
Keywords:
Network simulation,, Routing protocol,, AODV, Black hole attack,Abstract
In recent years, wired and wireless networks have become more popular. These days, the Internet is required to run any modern device. It has been noted that owing to their intrinsic features and system limits, wireless ad hoc networks are thought to be more susceptible to security risks than wired networks. This research article discusses assaults caused by malicious nodes. This paper will look at the effects of the Black Hole attack on AODV routing. This several studies also explore the method of detection. Numerous papers have addressed the challenges of simulating these assaults and determining their impact on network performance across a variety of network scenarios. Researchers have developed and deployed a wide variety of detection algorithms that may pinpoint a single rogue node in a network. Existing research undertaken to replicate AODV protocol has been the topic of this work.
References
Rutvij H. Jhaveri,Sankita J. Patel,Devesh C. Jinwala "Improving Route Discovery for AODV to Prevent Black hole and Grayhole Attacks in MANETs", INFOCOMP 2013.
Geng Peng, Zou Chaanyun "Routing Attack and Solutions in Mobile ad hoc Network" IEEE2006.
Y.Zhang and W.Lee,”Intrusion detection in wireless ad-hoc networks”, 6th annual international Mobile computing and networking conference proceedings, 2000.
Seungjoon Lee, Bohyung Han, Minho Shin; “Robust Routing in Wireless Ad Hoc Networks” 2002, international Conference.
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto; “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, Vol.5, No.3, PP.338–346, Nov. 2007, PP:338-346.
C. Perkins, E. Belding-Royer, S. Das, “RFC-3561 Ad hoc On-Demand Distance Vector (AODV) Routing”, pp. 1-32, July 2003.
Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks”, IEEE JSAC, vol. 24, no. 2, Feb. 2006.
Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection by Yibeltal Fantahum Alem & Zhao Hheng Xaun from Tainjin 300222, China 2010, IEEE.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.