A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

Mobile ad-hoc networks are prone to various security vulnerabilities because of its characteristics mainly high mobility of nodes, and no well defined architecture. Security measures are difficult to implement as there is no central administration. Several attacks on Mobile ad-hoc network have been identified so far and Black hole attack is one of them. In this paper we discuss black hole attack on Ad-hoc network and propose a solution to the hijacked node behaving as black hole node. A scenario has been considered where a node inside network has been intruded andcompromised to cause black hole attack. The proposed security solution modifies original AODV using a hierarchical based intrusion detection method to identify hijacked node and exclude the particular node from network.

[1]  Nitin H. Vaidya,et al.  Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.

[2]  J. J. Garcia-Luna-Aceves,et al.  An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..

[3]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[4]  R. Murugan,et al.  Cluster Based Node Misbehaviour Detection, Isolation and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks , 2012 .

[5]  LeeWenke,et al.  Intrusion detection techniques for mobile wireless networks , 2003 .

[6]  Kang G. Shin,et al.  Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[7]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[8]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[9]  S. Dokurer,et al.  Performance analysis of ad-hoc networks under black hole attacks , 2007, Proceedings 2007 IEEE SoutheastCon.

[10]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[11]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[12]  Vinay P. Virada Intrusion Detection System (IDS) for Secure MANETs: A Study , 2012 .

[13]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[14]  H. N. Pratihari Intrusion Detection System ( IDS ) for Secure MANETs : A Study , 2012 .