An Effective Strategy to Defense Black Hole Attack Based on AODV Routing Protocol

Article Preview

Abstract:

Mobile Ad hoc Network (MANET) has attracted lots of research efforts these years, mainly due to its appealing applications in no infrastructure situations such as battle fields and disaster recovery operations [1]. In this paper, we explore wireless Ad Hoc network focusing on its Routing Protocol AODV, we in depth analyze its operation principles and the problems exist in AODV routing protocol. AODV routing protocol is vulnerable, it is always exposed to many attacks, such as DoS, black hole, etc. [2] Through exhaustive researching the behaviors of black hole attack in NS2 simulation platform, and we finally propose a new routing security strategy to defense the black hole attack in AODV. Simulation results show that the strategy we proposed can not only effectively defense the black hole nodes, but also has better routing performance for moderate or small scale Ad Hoc Networks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

457-461

Citation:

Online since:

November 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zapata M G. Secure Ad Hoc on Demand Distance Vector (SAODV Routing. Mobile Ad Hoc Networking Working Group Internet Draf, 2001-08.

DOI: 10.1109/wicom.2009.5301883

Google Scholar

[2] Papadimitratos P, Haas Z. Secure Routing for Mobile Ad Hoc Networks. In SCS Communication Networks and Distributed System Modeling and Simulation Conference, 2002-01-18: 27-31.

Google Scholar

[3] Hu Yihchun, Johnson D B, Perrg. A SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. WMCSA 2002: 3-13.

DOI: 10.1016/s1570-8705(03)00019-2

Google Scholar

[4] Yi S, Naldurg P, Kravets R. A Security Aware Routing Protocol for Wireless Ad Hoc Networks In: The 6th World Multi-conference on Systems, Cybernetics and Informatics (SCI 2002), (2002).

DOI: 10.1145/501416.501464

Google Scholar

[5] H. Deng.W. Li and D.P. Agrawal: Routing security in wireless ad hoc network, IEEE Communications Magazine Page 70-75 (2002).

DOI: 10.1109/mcom.2002.1039859

Google Scholar

[6] Y. Huang and W. Lee Attack analysis and detection for Ad Hoc routing protocols, 7th international Symposium on Recent Advances in Intrusion Detection France sept, 2004 pp.125-145.

DOI: 10.1007/978-3-540-30143-1_7

Google Scholar

[7] Satoshi Kurosawa, Hidehisa Nakayama, Nei Kat, AbbasJamalipour, and Yoshiaki Nemoto, Detecting Black hole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method, International Journal on Network Security, Vol. 5, No. 3, P. P 338-346, Nov. (2007).

DOI: 10.1109/wowmom.2008.4594922

Google Scholar