Skip to main content

Improved AODV Performance in DOS and Black Hole Attack Environment

  • Conference paper
  • First Online:
Computational Intelligence in Data Mining - Volume 2

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 32))

Abstract

A mobile Ad hoc network has been constructed as virtual backbone or spine of wireless medium. Due to nomadic habit of the node, MANET network are easily establish to a group of nodes with self configuring manner. MANET is simple to set and has changing Topology. Routing in a MANET is a particularly challenging task compared to a conventional network. For data transfer in MANET one of the most commonly used routing protocol is Ad hoc on demand distance vector (AODV), where routes provide on demand and node act as router. It’s performance is based on the services of the network, however MANET are vulnerable to attacks due to it’s dynamic, nomadic and open environment. However, network is vulnerable to the attacks by presence of malicious nodes. DOS and Black Hole attacks are two security threats in AODV.DOS attacks aims to disrupt the service provided by network or server by continuously sending unwanted packets using malicious node. In Black hole attack, the aim of this attack to capture the path and send fake route reply message and routing information. So to overcome from these consequences we propose an algorithm which introduce a mechanism of DOS and Black hole attacks prevention and check network performance in malicious environment on the analysis of throughput and end to end delay.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ismail, I.I., Jaafar, M.H.F.: Mobile ad hoc network overview. In: Proceedings of Asia-Pacific Conference on Applied Electromagnetics (2014)

    Google Scholar 

  2. Yau, P.-W., Hu, S., Mitchell, C.J.: Malicious attacks on ad hoc network routing protocols

    Google Scholar 

  3. Mishra, A., Nadkarni, K.M.: Security in wireless ad hoc network. In: The Hand Book of Ad Hoc Wireless Network. CRC Press Inc., Boca Raton (2003)

    Google Scholar 

  4. Kumar, V., Sharma, R., Kush, A.: Effect of malicious nodes on AODV in mobile ad hoc networks. Int. J. Comput. Sci. Manage. Res. 1(3), 395 (2012)

    Google Scholar 

  5. Michiardi, P., Molva, R.: CORE: A Collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP TC6/TC11 Sixth Joint Working Conference of Communication and Multimedia Security (2002)

    Google Scholar 

  6. Al-Omari, S.A.K., Sumari, P.: An overview of mobile ad hoc networks for the existing protocols and application. J. Appl. Graph Theory Wireless Ad-hoc Netw. Sens. Netw 2(1), 87 (2010)

    Google Scholar 

  7. Sheikhl, R., Chandee, M.S., Mishra, D.K.: Security issues in MANET: a review. In: 7th International Conference on Wireless and Optical Communications Networks (2010)

    Google Scholar 

  8. Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2 (2009)

    Google Scholar 

  9. Gambhir, S., Sharma, S.: PPN: prime product number based malicious node detection scheme for MANETS

    Google Scholar 

  10. Sheikhl, R., Chandee, M.S., Mishra ,D.K.: Security issues in MANET: a review. In: IEEE, pp. 1–4, Sept 2010. ISBN 978-1-4244-7203-1

    Google Scholar 

  11. Dr. Tamilarasan, S.: Securing and Preventing AODV routing protocol from black hole attack using counter algorithm. Int. J. Eng. Res. Technol. (IJERT) 1(5) (2012)

    Google Scholar 

  12. Akanksha Saini, Harish Kumar : Effect of black hole attack on AODV routing protocol In MANET. IJCST 1(2) (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anurag Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Gupta, A., Patel, B., Rana, K., Pradhan, R. (2015). Improved AODV Performance in DOS and Black Hole Attack Environment. In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 2. Smart Innovation, Systems and Technologies, vol 32. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2208-8_49

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2208-8_49

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2207-1

  • Online ISBN: 978-81-322-2208-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics