BLACK HOLE ATTACK IN NETWORK USING AODV ROUTING PROTOCOL ON NS2: A REVIEW

Authors

  • Shivneet Singh

Keywords:

Network simulation,, Routing protocol,, AODV, Black hole attack,

Abstract

In recent years, wired and wireless networks have become more popular. These days, the Internet is required to run any modern device. It has been noted that owing to their intrinsic features and system limits, wireless ad hoc networks are thought to be more susceptible to security risks than wired networks. This research article discusses assaults caused by malicious nodes. This paper will look at the effects of the Black Hole attack on AODV routing. This several studies also explore the method of detection. Numerous papers have addressed the challenges of simulating these assaults and determining their impact on network performance across a variety of network scenarios. Researchers have developed and deployed a wide variety of detection algorithms that may pinpoint a single rogue node in a network. Existing research undertaken to replicate AODV protocol has been the topic of this work.

References

Rutvij H. Jhaveri,Sankita J. Patel,Devesh C. Jinwala "Improving Route Discovery for AODV to Prevent Black hole and Grayhole Attacks in MANETs", INFOCOMP 2013.

Geng Peng, Zou Chaanyun "Routing Attack and Solutions in Mobile ad hoc Network" IEEE2006.

Y.Zhang and W.Lee,”Intrusion detection in wireless ad-hoc networks”, 6th annual international Mobile computing and networking conference proceedings, 2000.

Seungjoon Lee, Bohyung Han, Minho Shin; “Robust Routing in Wireless Ad Hoc Networks” 2002, international Conference.

Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto; “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, Vol.5, No.3, PP.338–346, Nov. 2007, PP:338-346.

C. Perkins, E. Belding-Royer, S. Das, “RFC-3561 Ad hoc On-Demand Distance Vector (AODV) Routing”, pp. 1-32, July 2003.

Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks”, IEEE JSAC, vol. 24, no. 2, Feb. 2006.

Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection by Yibeltal Fantahum Alem & Zhao Hheng Xaun from Tainjin 300222, China 2010, IEEE.

Downloads

Published

31-12-2021

How to Cite

Singh, S. (2021). BLACK HOLE ATTACK IN NETWORK USING AODV ROUTING PROTOCOL ON NS2: A REVIEW. International Journal for Research Publication and Seminar, 12(4), 192–198. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/191

Issue

Section

Original Research Article