Enhanced AODV Protocol for Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network
Mobile Ad-hoc Network (MANET) is a kind of wireless network that has the most challenging network infrastructure. It is formed using the mobile nodes without any centralized administration from the security perspective and is a self-configuring fastest emerging wireless technology, each node on the MANET will act like a router which forwards the packets. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among a pair of nodes. Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (ADOV) is a reactive MANET routing protocols. Most of the attacks on MANETs are routing protocol attacks. Attacks on routing protocols, especially internal attacks will cause the damage to MANETs. Sinkhole and black hole attacks are a type of internal attack which is affected by attempting to draw all network traffic to malicious nodes that fake routing update and degrade the performance of the network. The black hole nodes should be detected from the network as early as possible via detection mechanism and should also guarantee the higher detection rate and less cross-over error rate. In this paper, we studied the characteristics of black hole attack and how it will affect the performance of the distance vector routing on demand routing protocol such as (ADOV) protocol, which recognizes the presence of black hole node from packet flow information between nodes and isolates it from the network via applying AODV protocol that one of popular routing protocol. We have evaluated the performance of the system using widely used simulator NS2, results prove the effectiveness of our prevention and detection method.
 C. Karlof, and D. Wagner, "Secure routing in sensor networks: attacks and countermeasures", Proceedings of the 1st IEEE Workshop on Sensor Network protocols and Applications, pp. 1-15, May 2003.
 DEVI. P, KANNAMMAL. A, â€œA PRAGMATIC APPROACH TO SECURE DSR PROTOCOL FROM SINKHOLE ATTACK IN AD HOC ENVIRONMENT", Journal of Theoretical and Applied Information Technology, 31st August 2014. Vol. 66 No.3
 Harshavardhan Kayarkar, â€œA Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniquesâ€, International Journal of Advanced Networking and Application, Vol. 03, Issue 05, pp. 1338-1351, March-April, 2012.
 H. C. Tseng, B. J. Culpepper, "Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators", Computers & Security, vol.24, 561-570, 2005.
 H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks", IEEE Communications Magazine vol. 40 no. 10, pp. 70-75, Oct. 2002.
 Johnson DB, Maltz DA, Hu YC.The dynamic source routing protocol for the mobile ad-hoc network (DSR), IETF internet-draft (work in progress); July 2004.
 Kim, G., Han, Y. and Kim, S. (2010) â€˜A cooperative sinkhole detection method for mobile ad hoc networksâ€™, AEU â€“ International Journal of Electronics and Communications, Vol. 64, No. 5, pp.390â€“397, Elsevier
 Marchang, N., and Datta, R. (2008) â€˜Collaborative techniques for intrusion detection in mobile ad-hoc networks', Ad Hoc Networks, Vol. 6, No. 4, pp.508â€“523, Elsevier.
 Mohammed Ashfaq Hussain, Dr. A. Francis Saviour Devaraj, â€œUpshot of Sinkhole Attack in DSR Routing Protocol Based MANETâ€, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.1737-1741.
 Perkins CE, Royer EM, Das SR. Ad-hoc on-demand distance vector (AODV) routing, IETF internet draft. MANET Working Group
 P.G. Argyroudis and D. O'Mahony, "Secure Routing for mobile ad hoc networks", IEEE Communications Surveys & Tutorials, third quarter 2005, Vol. 7, no3, 2005 258 Authorized licensed use limited to University of Allahabad.
 P. Papadimitratos and Z. Haas, "Securing the Internet routing infrastructure", IEEE Communications Magazine, vol. 40, no. 10, pp 60-68, Oct 2002.
 Rajeshwar L. Balla, Venugopal Kotoju, â€œSinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocolâ€, COMPUSOFT, An international journal of advanced computer technology, 2 (7), July-2013 (Volume-II, Issue-VII).
 R.Bhairavi, A.Santhiya," Intelligent Scheme for Defending Against Black-Hole Attacks by Malicious Nodes in Dynamic Source Routing Protocol", International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: 2321-2152 Volume No.-4, Issue No.-2, March 2016.
 Shim, W., Kim, G. and Kim, S. (2010) â€˜A distributed sinkhole detection method using cluster analysis', Expert Systems with Applications, Vol. 37, No. 12, pp.8486â€“8491, Elsevier.
 S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks," Proceedings of MobiHoc, June 2002.
 S. Lee, B. Han, and M. Shin, â€œRobust routing in wireless ad hoc networks,â€ Proceedings of 31st ICPP Workshops, pp. 73â€“78, Aug. 2002
 S. Marti, T. J. Giuli, K. Lai, and M. Baker, â€œMitigating routing misbehavior in mobile ad hoc networks,â€ Proceeding of 6th Annual International Conference on Mobile Computing and Network, Boston, MA, pp. 255â€“265, 2000
 Tirthraj Rai1 & Ashish Jain2, "Secure Routing in Mobile Ad hoc Network", International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 125-127
 Tseng, H.C., and Culpepper, B.J. (2005) â€˜Sinkhole intrusion in mobile ad hoc networks: the problem and some detection indicators', Computers & Security, Vol. 24, No. 7, pp.561â€“570, Elsevier.
 Manel Guerrero Zapata, N. Asokan. "Securing Ad hoc Routing Protocols".
 Nisha Puri, Simranjit Kaur, Sandeep Kumar Arora. "Performance Analysis of Mobile Ad Hoc Network in the Presence of Sink Hole attack". International Journal of Scientific Engineering and Research (IJSER). Volume 1 Issue 3, November 2013.
 Semih Dokurer, Y. M. Erten, Can Erkin Acar, " Performance analysis of ad-hoc networks under black hole attacks". Department of Computer Engineering, Southeastcon Journal. 2007.
 Monika, Denial of Service Attacks in Wireless Mesh Networks, Monika /(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3), 2012,4516-4522.
Authors retain the copyright of their manuscripts, and all Open Access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided that the original work is properly cited.