Abstract

Mobile Ad-hoc Network (MANET) is a kind of wireless network that has the most challenging network infrastructure. It is formed using the mobile nodes without any centralized administration from the security perspective and is a self-configuring fastest emerging wireless technology, each node on the MANET will act like a router which forwards the packets. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among a pair of nodes. Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (ADOV) is a reactive MANET routing protocols. Most of the attacks on MANETs are routing protocol attacks. Attacks on routing protocols, especially internal attacks will cause the damage to MANETs. Sinkhole and black hole attacks are a type of internal attack which is affected by attempting to draw all network traffic to malicious nodes that fake routing update and degrade the performance of the network. The black hole nodes should be detected from the network as early as possible via detection mechanism and should also guarantee the higher detection rate and less cross-over error rate. In this paper, we studied the characteristics of black hole attack and how it will affect the performance of the distance vector routing on demand routing protocol such as (ADOV) protocol, which recognizes the presence of black hole node from packet flow information between nodes and isolates it from the network via applying AODV protocol that one of popular routing protocol. We have evaluated the performance of the system using widely used simulator NS2, results prove the effectiveness of our prevention and detection method.

Highlights

  • We studied the characteristics of black hole attack and how it will affect the performance of the distance vector routing on demand routing protocol such as (ADOV) protocol, which recognizes the presence of black hole node from packet flow information between nodes and isolates it from the network via applying AODV protocol that one of popular routing protocol

  • Mobile Ad hoc networks (MANET) are the collection of autonomous nodes; each node determines the topology of the network

  • MANETs are more vulnerable to network attacks as it gains and loss many nodes simultaneously, and these nodes are pushed into the resource constraints such as bandwidth, storage, and energy capacity

Read more

Summary

Introduction

Mobile Ad hoc networks (MANET) are the collection of autonomous nodes; each node determines the topology of the network. They can communicate to each other via some wireles s network (or radio links). Two nodes can communicate directly to forward messages from the source node to neighbors till the messages reach the destination nodes so the nodes act as both host and router at the constant time, but if these nodes are beyond the network range they need some intermediate nodes to deliver the packet to the designated node. MANETs are more vulnerable to network attacks as it gains and loss many nodes simultaneously, and these nodes are pushed into the resource constraints such as bandwidth, storage, and energy capacity. Attacks on MANETs can be categorized into two major groups: internal and external [13]

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call