An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET

Interest in the area of Mobile Ad-hoc Network (MANET) is growing since last few years because of its practical applications and requirement of communication in mobile devices. However, in comparison to wired network or infrastructure-based wireless network, MANET is particularly vulnerable to security attacks due to its fundamental characteristics, e.g., the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. The black hole attack is one of such security risks. In this attack, a malicious node falsely advertise shortest path to the destination node with an intension to disrupt the communication. In this paper, we propose a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs. The proposed method uses promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network. The simulation results show the efficacy of the proposed method as throughput of the network does not deteriorate in presence of the back holes.

[1]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[2]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[3]  Mehdi Medadian,et al.  Combat with Black hole attack in AODV routing protocol in MANET , 2009, 2009 First Asian Himalayas International Conference on Internet.

[4]  A. Pushpa Trust based secure routing in AODV routing protocol , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[5]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[6]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[7]  Yibeltal Fantahun Alem,et al.  Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection , 2010, 2010 2nd International Conference on Future Computer and Communication.

[8]  Ashish Jain,et al.  Secure Routing in Mobile Ad hoc Network , 2010 .

[9]  Vaduvur Bharghavan,et al.  CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[10]  Vaduvur Bharghavan,et al.  CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..

[11]  Kwok-Yan Lam,et al.  SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.

[12]  J. J. Garcia-Luna-Aceves,et al.  An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..

[13]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[14]  Mario Joa-Ng,et al.  A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks , 1999, IEEE J. Sel. Areas Commun..

[15]  Chai-Keong Toh,et al.  Associativity-Based Routing for Ad Hoc Mobile Networks , 1997, Wirel. Pers. Commun..

[16]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[17]  R.A. Raja Mahmood,et al.  A survey on detecting black hole attack in AODV-based mobile ad hoc networks , 2007, 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies.

[18]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[19]  Davide Cerri,et al.  Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.

[20]  C C. Chiang,et al.  Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .

[21]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[22]  Dharma P. Agrawal,et al.  Strategies for enhancing routing security in protocols for mobile ad hoc networks , 2003, J. Parallel Distributed Comput..

[23]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .