Title :
Prevention of black hole attack on AODV in MANET using hash function
Author :
Aware, Anand A. ; Bhandari, Kiran
Author_Institution :
Comput. Eng. Dept., Univ. of Mumbai, Mumbai, India
Abstract :
Mobile ad hoc networks (MANET) are acquiring popularity today, as it offers wireless connectivity to the users irrespective of their geographical position. An ad-hoc network does not have a centralized infrastructure. It is a wireless network where nodes communicate with each other through multiple hops. If the nodes in the ad-hoc network change their positions dynamically, it is called a mobile ad-hoc network (MANET). It has characteristics like shared physical medium, autonomous terminal, limited physical security, infrastructure less communication, Dynamic topology, large degree of freedom, self organizing capability. Such characteristics provide an open environment for users to maintain connectivity irrespective of their geographical positions but, such types of networks are vulnerable to various kinds of attack. Ad hoc on demand Distance Vector (AODV) is one of the key protocols used for routing in MANET. The security of AODV protocol can be shattered by black hole attack. A Black hole attack can devastate routing in mobile ad hoc network. A Black hole is a malevolent node that proclaims to have the shortest optimal path to the desired destination node but in reality it does not have any active path to particular destination and the packets received by the black hole from other nodes are dropped. As the black hole attack gives the fake shortest path to the destination hence in our proposed scheme, the first optimal path is discarded and the second optimal route is selected. To maintain data integrity and for prevention of black / gray hole attack hash function is used.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication security; AODV; AODV protocol; MANET; ad hoc on demand distance vector; black hole attack prevention; black-gray hole attack hash function; dynamic topology; geographical position; hash function; malevolent node; mobile ad hoc networks; physical security; wireless connectivity; wireless network; Delays; Mobile ad hoc networks; Routing; Routing protocols; Wireless communication; AODV; Black hole; Cooperative Black hole; MANET; gray hole;
Conference_Titel :
Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 3rd International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-6895-4
DOI :
10.1109/ICRITO.2014.7014732