A survey on attacks in Ad hoc on Demand Distance Vector protocol

Mobile Ad hoc Network (MANET) consists of several nodes which are configurable. It consists of multiple number of wireless nodes. The nodes are mobile nodes. It consists of many mobile nodes. The topology may get changed due to higher mobility. The security is another aspect which is very low. Routing protocols are used for transferring the data packets. Due to high vulnerability in security, many attacks such as black hole attacks may occur at the time of routing in routing protocols. AODV is one of the routing protocols which is also affected by such attacks. In this paper several existing methods available to mitigate the attacks in AODV protocol are analyzed.

[1]  R. H. Jhaveri,et al.  MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[2]  Jaydip Sen,et al.  A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.

[3]  Ali Dorri,et al.  A new approach for detecting and eliminating cooperative black hole nodes in MANET , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).

[4]  Isaac Woungang,et al.  GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETs , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[5]  Krishan Kumar Saluja,et al.  Defending MANETs against flooding attacks for military applications under group mobility , 2014, 2014 Recent Advances in Engineering and Computational Sciences (RAECS).

[6]  R. Saravanan,et al.  A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.

[7]  Mohit Jain,et al.  The Intelligent Network , 1989, Springer Berlin Heidelberg.

[8]  Z. A. Khan,et al.  Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.

[9]  Ankur Mishra,et al.  A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[10]  Xu Huang,et al.  Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange , 2010, 2010 Fourth International Conference on Network and System Security.

[11]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).