Abstract
MANET (Mobile ad hoc networks) is a collection of wireless mobile nodes dynamically forming an infrastructure less network. Several routing protocols are designed for routing of packets in MANET. One of them is AODV (Ad hoc on demand Distance Vector) protocol whose performance is better for higher mobile nodes. It is more vulnerable to black hole attack by the malicious node. Black hole attack is a network layer attack in MANET that tries to hamper the routing process. During route discovery phase it sends false reply to the nodes and dropped data packets. In this paper, first we have implemented black hole attack in AODV and then analyzed the impact of black hole attack under deferent metrics like throughput, packet delivery ratio and packet loss. Simulator NS-2.35 is used for implementation and result analysis.
Highlights
MANET or mobile ad hoc network is the infrastructure less network
From the above graphs for Ad-hoc On-Demand Distance Vector (AODV) and black hole attack AODV with multiple malicious node it is observed that with the impact of black hole attack the performance of normal AODV is affected
It is observed that PDR for black hole attack AODV is less than that of normal AODV
Summary
MANET or mobile ad hoc network is the infrastructure less network. All the nodes in MANET act as a router to route the packet and does not require any external base station or access point to transfer data among nodes. AODV [1,2] is one of the most suitable routing protocol for MANET and it is more vulnerable to black hole attack [3] by the malicious nodes. In the black hole attack a malicious node absorb all data packets in itself. Malicious nodes dropping all the traffic in the network make use of the vulnerability of the root discovery packets of the on demand protocols such as AODV. In case of multiple malicious nodes that work together with cooperatively, the effect will be more. This type of effect is known as cooperative black hole attack. The paper is concerned about the implementation algorithm of black hole attack in AODV. Simulations are done in NS 2.35 tool [9]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Engineering Technologies and Management Research
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.