Robust Routing in Wireless Ad Hoc Networks
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
Black hole attack in mobile Ad Hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Prevention of Blackhole Attack in MANET
AUSWIRELESS '07 Proceedings of the The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications
A Simulation Study of Routing Performance in Realistic Urban Scenarios for MANETs
ANTS '08 Proceedings of the 6th international conference on Ant Colony Optimization and Swarm Intelligence
Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks
IEEC '09 Proceedings of the 2009 International Symposium on Information Engineering and Electronic Commerce
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks
ISMS '11 Proceedings of the 2011 Second International Conference on Intelligent Systems, Modelling and Simulation
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
Hi-index | 0.00 |
Mobile Adhoc Networks MANETs are open to a wide range of attacks due to their unique characteristics like dynamic topology, shared medium, absence of infrastructure, and resource constraints. Data packets sent by a source node may reach destination through a number of intermediate nodes. In the absence of security mechanism, it is easy for an intermediate node to intercept or modify the messages, thus attacking the normal operation of MANET. One such attack is Black hole attack, in which, a malicious node called Black hole node attracts all the traffic of the network towards itself, and discards all the packets without forwarding them to the intended recipients. This paper evaluates the performance of Adhoc on-demand Distance Vector AODV and its multi-path variant Adhoc On-demand Multi-path Distance Vector AOMDV routing protocols under black hole attack. Non-cryptographic solutions Secure Blackhole AODV SBAODV and Secure Blackhole AOMDV SBAOMDV have been proposed to mitigate the effect of black hole attack. Through NS-2 simulations, the performance of the proposed protocols with video streaming is analyzed. The results show that the proposed solutions provide better performance than the conventional AODV and AOMDV.