160 research outputs found

    Eaodv: A*-based Enhancement Ad-hoc on Demand Vector Protocol to Prevent Black Hole Attacks

    Get PDF
    Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the packets, as a result, the network performance will drop. Most previous works are focused on anomaly detection through dynamic trusted of the neighbouring nodes. We find out that the internal comparisons take a long time. This loss can be shortened by changing the routing mechanism. We propose an enhancement of AODV protocol, named EAODV, that is able to prevent black hole attacks. The EAODV can find a shortest path of routing discovery using A* heuristic search algorithm. Values of hop count and estimate time to reach the destination node are used as input in the heuristic equation and one-way hash function is used to make a secure value and then to casting it to all neighbouring nodes. Experiments were conducted in NS2 to simulate EAODV in different running time with and without black hole nodes. The EAODV performance results are indicated better in terms Packet loss and Average End-to-End delay

    PERFORMANCE EVALUATION OF MODIFIED AODV AGAINST BLACK HOLE ATTACK IN MANET

    Get PDF
    A mobile ad-hoc network is an infrastructure less network which consists of a number of mobile nodes that dynamically form a temporary network for the transmission of data from source to destination. They are composed of nodes that relay on each other to manage and for secure transmission of traffic due to lack of centralized administration. As MANETs become widely used, the security issue has become one of the primary concerns for all the times. One of the well known attack is the Black Hole attack which is most common in the on-demand routing protocols such as AODV.In this paper, the proposed solution is to modify the AODV routing protocol in such a way that it can combat the cooperative Black Hole attack. The results show an effective increase in throughput and PDR and decrease in average end-to-end delay with a slight increase in routing overhead

    A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols

    Get PDF
    Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore susceptible to a variety of assaults. Routing technologies such as AODV and dynamic source routing are quite common. Both however are susceptible to a variety of network layer attacks, including black holes, wormholes, rushing, byzantine, information disclosure. The mobility of the nodes and the open architecture in which the nodes are free to join or leave the network keep changing the topology of the network. The routing in such scenarios becomes a challenging task since it has to take into account the constraints of resources of mobile devices. In this an analysis of these protocols indicates that, though proactive routing protocols maintain a route to every destination and have low latency, they suffer from high routing overheads and inability to keep up with the dynamic topology in a large sized network. The reactive routing protocols in contrast have low routing overheads, better throughput and higher packet delivery ratio. AODVACO-PSO-DHKE Methodology boosts throughput by 10% while reducing routing overhead by 7%, latency by 8% and energy consumption by 5%. To avoid nodes always being on, a duty cycle procedure that's also paired with the hybrid method is used ACO-FDR PSO is applied to a 100-node network and NS-3 is used to measure various metrics such as throughput, latency, overhead, energy consumption and packet delivery ratio

    A Survey on Security Analysis of Routing Protocols

    Get PDF
    Mobile ad hoc networking (MANET) is gradually emerging to be very important in the growth of wireless technology. This is anticipated to offer a range of flexible services to mobile and nomadic users by means of integrated homogeneous architecture. The proper routing protocol is necessary for better communication in MANET. One of the existing reliable protocols is Ad Hoc On-Demand Vector Routing (AODV) protocol which is a reactive routing protocol for ad hoc and mobile networks that maintains routes only between nodes that wants to communicate. There are various security issues to be considered in this protocol. In order to provide security for AODV protocol, Secure Ad Hoc On-Demand Vector Routing (SAODV) can be used. SAODV is an extension of the AODV routing protocol that can be used to shield the route discovery process by providing security characteristics like integrity and authentication. For secure protocol, digital signature, hash chains, etc., can be used in routing. This paper surveys on various techniques available for securing the mobile ad hoc network

    Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks

    Get PDF
    Mobile ad hoc networks (MANETs) form a new wireless networking paradigm with unique characteristics that give them appreciated interest in a vast range of applications. However, many challenges are facing MANETs including security, routing, transmission range, and dynamically changing topology with high node mobility. Security is considered as the main obstacle for the widespread adoption of MANET applications. Black hole attack is a type of DoS attack that can disrupt the services of the network layer. It has the worst malicious impact on network performance as the number of malicious nodes increases. Several mechanisms and protocols have been proposed to detect and mitigate its effects using different strategies. However, many of these solutions impose more overhead and increase the average end-to-end delay. This chapter proposes an enhanced and modified protocol called “Enhanced RID-AODV,” based on a preceding mechanism: RID-AODV. The proposed enhancement is based on creating dynamic blacklists for each node in the network. Each node, according to criteria, depends on the number of mismatches of hash values of received packets as compared with some threshold values, and the sudden change in the round-trip time (RTT) can decide to add or remove other nodes to or from its blacklist. The threshold is a function of mobility (variable threshold) to cancel the effect of normal link failure. Enhanced RID-AODV was implemented in ns-2 simulator and compared with three previous solutions for mitigating multiple black hole attacks in terms of performance metrics. The results show an increase in throughput and packet delivery ratio and a decrease in end-to-end delay and overhead ratio

    Analysis of Black hole Attack in Ad hoc On-Demand Distance Vector (AODV) Routing Protocol : Vehicular Ad-hoc Networks (VANET) Context

    Get PDF
    In past years, popularity of Mobile Ad hoc Networks has led to the conception of Vehicular Ad hoc Networks. These networks must be highly secure before their implementation in real world. One of the vital aspects of these networks is routing protocol. Most of the protocols in VANET acknowledge all nodes in a network to be genuine by default. But there might be malicious nodes which can make the network vulnerable to various attacks. One such attacks is a black hole attack on AODV routing protocol. Because of its popularity, AODV and black hole attack are taken into consideration for this thesis. The aim of the thesis is to analyze effects of black hole attack on AODV and understand security need of routing protocols in VANET. The experimentation for this thesis was performed with 40, 60 and 80 nodes in network simulator (NS). The performance metrics such as average throughput, end to end delay and packet delivery ratio of each assumed scenarios under blackhole attack and with prevention method are calculated. The obtained calculations are compared to analyze the network performance of AODV. The results from the simulator demonstrate that overall network performance of AODV increased with black hole prevention algorithm in comparison to AODV under black hole attack only. Out of all the performance metrics that are used to analyze the network performance, the average throughput of AODV is significantly increased by 21 percent (approximately) when the mitigation algorithm is applied. The prevention approach used for the thesis can make AODV perform better against black hole attack. However, this approach is limited to a small to medium sized networks only

    Routing Protocols to Enhance Security in MANETS

    Get PDF
    Mobile ad hoc networking (MANET) is gradually emerging to be very important in the growth of wireless technology. This is anticipated to offer a range of flexible services to mobile and nomadic users by means of integrated homogeneous architecture. The proper routing protocol is necessary for better communication in MANET. One of the existing reliable protocols is Ad Hoc On-Demand Vector Routing (AODV) protocol which is a reactive routing protocol for ad hoc and mobile networks that maintains routes only between nodes that wants to communicate. There are various security issues to be considered in this protocol. In order to provide security for AODV protocol, Secure Ad Hoc On-Demand Vector Routing (SAODV) can be used. SAODV is an extension of the AODV routing protocol that can be used to shield the route discovery process by providing security characteristics like integrity and authentication. For secure protocol, digital signature, hash chains, etc., can be used in routing. This paper surveys on various techniques available for securing the mobile ad hoc network

    Performance and Security Analysis for Proactive and Reactive Protocols in Mobile Ad-hoc Network

    Get PDF
    This paper discussed about two proactive protocols which are DSDV and OLSR as well as two reactive protocols which are AODV and DSR. In addition, security analyses have been conducted and it covered the possible attacks that can be implemented against Mobile Ad-hoc Network (MANET). Furthermore, analysis and the comparison studies of the routing protocols in MANET that is conducted by simulation are discussed. The metrics have been used to compare these routing protocols are throughput, end to end delay, packet delivery ratio fraction verses the number of nodes in AODV and DSR. A black hole security attack was simulated and analyzed for DSDV, AODV and DSR. This study also investigated the impact of the increased in number of nodes used in the simulation to have more accurate results for the analysis

    A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols

    Get PDF
    Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore susceptible to a variety of assaults. Routing technologies such as AODV and dynamic source routing are quite common. Both however are susceptible to a variety of network layer attacks, including black holes, wormholes, rushing, byzantine, information disclosure. The mobility of the nodes and the open architecture in which the nodes are free to join or leave the network keep changing the topology of the network. The routing in such scenarios becomes a challenging task since it has to take into account the constraints of resources of mobile devices. In this  an analysis of these protocols indicates that, though proactive routing protocols maintain a route to every destination and have low latency, they suffer from high routing overheads and inability to keep up with the dynamic topology in a large sized network. The reactive routing protocols in contrast have low routing overheads, better throughput and higher packet delivery ratio. AODVACO-PSO-DHKE Methodology boosts throughput by 10% while reducing routing overhead by 7%, latency by 8% and energy consumption by 5%. To avoid nodes always being on, a duty cycle procedure that's also paired with the hybrid method is used ACO-FDR PSO is applied to a 100-node network and NS-3 is used to measure various metrics such as throughput, latency, overhead, energy consumption and packet delivery ratio
    corecore