A Reliable and Secure AODV Protocol for MANETs

  • Authors

    • Ajit Kumar Singh Yadav
    • Rajesh K. Yadav
    https://doi.org/10.14419/ijet.v7i4.38.27603

    Received date: February 20, 2019

    Accepted date: February 20, 2019

    Published date: December 3, 2018

  • Mobile adhoc Network, AODV, relative velocity, black hole attack and Intrusion Detection System.
  • Abstract

    In recent years, Mobile ad hoc networks ((MANETs) have generated great interest among researchers in their implementation under several computing environments. However, MANETs are highly susceptible to various security attacks due to their inherent characteristics. The ad hoc on demand distance vector (AODV) is most suitable routing protocol for mobile adhoc networks in which resource consumption attacks are frequent if it is not detected timely. In this paper, we have proposed a scheme to detect as well as overcome black hole attacks using an Intrusion Detection System (IDS). The proposed scheme is implemented using network simulator 2(NS2) to compare its performance against the standard AODV with and without attack. The results of the simulation show that proposed scheme optimizes the end-to-end delay, normalized routing load, packet delivery fraction and average throughput in comparison with AODV protocols under black hole attack.

  • References

    1. Salehi, M., Darehshoorzadeh, A., & Boukerche, A. On the Effect of Black-hole Attack on Opportunistic Routing Protocols. In Pro-ceedings of the 12th ACM Symposium on Performance Evalua-tion of Wireless Ad Hoc, Sensor, & Ubiquitous Networks ,pp. 93-100. ACM. (2015)
    2. Hiremath, P. S., and T. Anuradha. "Performance Comparison of Cluster based and Threshold based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs." In-ternational Journal of Advanced Networking and Applications 6.3: 2352. (2014)
    3. Thachil, F., Shet , K. C.: A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET,Computing Sciences (ICCS), 2012 International Conference on, Phagwara,pp. 281-285(2012)
    4. Perkins, C.E., Royer, E.M. "Ad-hoc on-demand distance vector routing," Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on, New Or-leans, LA, pp. 90-100.(1999)
    5. Jambli, M. N., Wan Mohd Shuhaimi, W. B., Lenando, H., Abdul-lah, J., & Suhaili, S. M. : Enhancement of AODV routing proto-col in MASNETs. In IT in Asia (CITA), 2015 9th International Conference on,pp. 1-6.(2015)
    6. Zou, Y., & Chakrabarty, K. “Distributed mobility management for target tracking in mobile sensor networks,” IEEETrans. Mob. Comput. vol. 6, no. 8, pp. 872–887. (2007)
    7. Li, W., Chen, M., & Li, M. M. (2009). An enhanced aodv route protocol applying in the wireless sensor networks. In Fuzzy In-formation and Engineering Volume 2,pp. 1591-1600.(2009)
    8. Murthy, C. Siva Ram, and B. S. Manoj. :Ad Hoc Wireless Net-works: Architectures and Protocols, Portable Documents. Pearson education.(2004)
    9. Dhurandher, S.K., Isaac W., Mathur, R., & Khurana, P.: GAODV: A Modified AODV against single andcollaborative Black Hole attacks in MANETs." In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on, pp. 357-362.(2013)
    10. Chen, H., Wu, H., Hu, J., & Gao, C. Event-based trust frame-work model in wireless sensor networks. In Networking, Archi-tecture, and Storage, 2008. NAS'08. International Conference on (pp. 359-364). IEEE. (2008)
    11. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemo-to, Y. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. IJ Network Securi-ty, 5(3), pp.338-346.(2007)
    12. Ehsan, H., & Khan, F. A.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on ,pp. 1181-1187.(2012)
    13. Rathore, H., Badarla, V., Jha, S., & Gupta, A. Novel approach for security in wireless sensor network using Bio-inspirations. In Communication Systems and Networks (COMSNETS), 2014 Sixth International Conference on ,pp. 1-8.(2014)
    14. Khandelwal, V., & Goyal, D.: Black Hole Attack and Detection Method for AODV Routing Protocol in MANETs. IJARCET, 2(4), 1555-9. (2013)
    15. Djenouri, D. and Badache, N.: Struggling against selfishness and black hole attacks in MANETs. Wirel. Commun. Mob. Comput., 8: 689–704. (2008)
    16. Deng, H., Li, W., & Agrawal, D. P. Routing security in wireless ad hoc networks. Communications
    17. Magazine, IEEE, 40(10), 70-75. (2002)
    18. Zapata, M. G. Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing
    19. and Communications Review, 6(3), 106-107.(2002)
    20. Introduction to Network Simulator NS2(2nd Edition) by Teerawat Issariyakul, Ekra Hossain
    21. The Network Simulator (NS-2); http://nsnam.isi.edu/nsnam/index.php/User_Information
    22. Tcl Tutorial - Tcl/Tk; https://www.tcl.tk/man/tcl8.5/tutorial/tcltutorial.html
    23. Generating sensor node-movement and traffic-connection files for large wireless scenarios,
    24. http://www.isi.edu/nsnam/ns/tutorial/nsscript7.html
    25. Post processing NS2 Result using NS2 Trace — New Wireless Trace file format,
    26. http://ns2ultimate.tumblr.com/post/32176398101/post-processing-ns2-result-using-ns2-trace-new
  • Downloads

  • How to Cite

    Kumar Singh Yadav, A., & K. Yadav, R. (2018). A Reliable and Secure AODV Protocol for MANETs. International Journal of Engineering and Technology, 7(4.38), 893-897. https://doi.org/10.14419/ijet.v7i4.38.27603