Title :
An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET
Author :
Singh, Pramod Kumar ; Sharma, Govind
Author_Institution :
ABV - Indian Inst. of Inf. Technol. & Manage. Gwalior, Gwalior, India
Abstract :
Interest in the area of Mobile Ad-hoc Network (MANET) is growing since last few years because of its practical applications and requirement of communication in mobile devices. However, in comparison to wired network or infrastructure-based wireless network, MANET is particularly vulnerable to security attacks due to its fundamental characteristics, e.g., the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. The black hole attack is one of such security risks. In this attack, a malicious node falsely advertise shortest path to the destination node with an intension to disrupt the communication. In this paper, we propose a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs. The proposed method uses promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network. The simulation results show the efficacy of the proposed method as throughput of the network does not deteriorate in presence of the back holes.
Keywords :
mobile ad hoc networks; mobility management (mobile radio); routing protocols; telecommunication network topology; telecommunication security; AODV routing protocol; MANET; ad-hoc on demand distance vector routing; autonomous terminal; black hole problem prevention; centralized management; centralized monitoring; dynamic network topology; infrastructure-based wireless network; malicious node detection; mobile ad-hoc network; mobile devices; open medium; promiscuous mode; security attacks; wired network; Mobile ad hoc networks; Mobile communication; Mobile computing; Routing; Routing protocols; Security; AODV; Ad-hoc network; Black Hole Attack; Malicious node; Secured Routing;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
DOI :
10.1109/TrustCom.2012.78