ENHANCED ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL TO PREVENT BLACKHOLE ATTACK IN MANET
DOI:
https://doi.org/10.15282/ijsecs.9.1.2023.7.0111Keywords:
Mobile Ad-hoc Network, Blackhole, AODV Routing Protocol, Network Simulator 2Abstract
Wireless networks are becoming increasingly popular. Mobile ad hoc networks are one category among the different types of wireless networks that transmit packets from the sender node to the receiver node without the use of a base station or infrastructure, as the nodes serve as both hosts and routers. These networks are referred to as mobile because they are movable. MANET is an ad-hoc network that can change positions at any time, and nodes can join or leave at any moment, making it vulnerable to attacks such as Blackhole. Existing solutions, in some ways, led to more memory space consumption, while others led to an overhead. This research proposes an Enhanced On-demand Distance Vector (AODV) routing protocol to prevent Blackhole attacks on MANETs using Diffie Hellman and Message Digest 5 (DHMD), implemented using Network Simulator 2 (NS2). The performance of the proposed protocol was evaluated using the following parameters: Packet Delivery Ratio, throughput, End to End (E2E) Delay, and routing overhead. It
was concluded that DHMD has reduced network overhead as it resulted to 23% while AODV resulted at 38% and memory consumption for DHMD gave 0.52ms compared to AODV that gave 0.81ms due to Blackhole prevention. This research will help to mitigate the effect of blackhole attacks in a network and increase network performance by reducing overhead and memory
consumption.
References
K. Ahmed, Al-Shammari, P., Ehkan, N. Y., “Future Barriers, Challenging Security Attacks and Secure Routing Issues in
MANET”, Australian Journal of Basic and Applied Sciences, Australia. pp. 20-25, 2017, DOI:10.22587/ajbas.2017.11.15.4
O. Afolayan, and , M. O. Oyenike,“Review of Mobile Ad Hoc Network Protocols” IOSR Journal of Computer Engineering
(IOSR-JCE), India. pp. 1-12, 2015, doi: 10.9790/0661-17220112
S. Kumar, and K. Dutta, “Intrusion detection technique for black hole attack in mobile ad hoc networks”. International Journal
of Information Privacy, Security and Integrity, Switzerland. pp. 81, 2015, doi.org/10.1504/IJIPSI.2015.075435
S. Yugarshi, P. Prashant,K. Arya, and K. Smit, A modified AODV protocol for preventing blackhole attack in MANETs”,
Information Security Journal: A Global Perspective, United State. pp. 240-248, 2017, doi.org/10.1080/19393555.2017.1358780
V. Ashish., and Shrivastava S., “Security Enhancement in MANETs Using Fuzzy Based Trust Computation Against Blackhole
Attacks”, in Information and Communication Technology, Springer, Singapore, pp. 39-47, 2018, DOI:10.1007/978-981-10-
-9_4
D. Bisen, P. Suman, S. Sharma, and R. Shukla, “Effect of Pause Time on DSR, AODV and DYMO Routing Protocols in
MANET,” International Journal of IT & Knowledge Management, vol. 3, no. 1, pp. 1–6, 2010.
S.Philomina, R. Ramesh, “Secure Routing-Solution to Diminish DOS Attack in AODV Based MANET”, International Journal
of Chemical Sciences Research, India, 15(4):188, 2017
V. Ashwini and S. Kishor, “Blackhole Attack Detection And Prevention Mechanism Using Ns2 Simulation”, International
Journal Of Scientific & Technology Research, Volume 8, Issue 11, Europe, 2019.
Md Ibrahim Talukdar, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, Amjed Sid Ahmed, "Performance
Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature", Wireless Communications and
Mobile Computing, vol. 2021, Article ID 6693316, 13 pages, 2021. https://doi.org/10.1155/2021/6693316
J. Sen, S.Koilakonda, and A. Ukil, “A Mechanism for Detection of Cooperative Black hole Attack in Mobile Ad Hoc Networks”,
Proceedings of the Second IEEE International Conference on Intelligent Systems, Modeling and Simulation, ACTA Press,
Canada. pp. 338-343, 2011, DOI:10.5013/IJSSST.a.12.04.04
A.Baadache,. and A. Belmehdi, “Fighting Against Packet Dropping Misbehavior in Multi-hop Wireless Ad Hoc Networks”,
Journal of Network and Computer Applications, United State, pp. 1130–1139, 2012, doi.org/10.1016/j.jnca.2011.12.012
M. Mohanapriya, and I. Krishnamurthi, “Modified DSR protocol for Detection and Removal of Selective Black hole Attack in
MANET”. Computers and Electrical Engineering, United Kingdom. pp. 530-538, 2014, doi.org/10.1016/
j.compeleceng.2013.06.001
V. Kumar, ., and K. Somasundaram, .. “An Effective CBHDAP Protocol for Black Hole Attack Detection in Manet”. Indian
Journal of Science and Technology, India. 9(36), 2016, DOI:10.17485/ijst/2016/v9i36/95632
I. Umar, Z. Hanapi, A.Sali, and A. Zulkarnain, “TruFiX: A Configurable Trust-Based CrossLayer Protocol for Wireless Sensor
Networks”. IEEE Access, pp. 2550-2562, 2017, doi: 10.1109/ACCESS.2017.2672827
S. Kadry, A. Sayed and M. Abdelhady “Energy Efficient load balancing scheme of DSR protocol (EELB-DSR)”, International
Journal of Computer Science and Mobile Computing (IJCSMC), North Lalaguda, India vol. 8 No. 1,2019.
A. Abdulsalam, A. Hadeel and A. Areej “Blackhole attack prevention in MANET using Enhanced AODV protocol”. Proceedings
of the Second International Conference on Data Science, E-Learning and Information Systems, Association for Computing
Machinery New York, NY, United States, pp 1-5, 2019, https://doi.org/10.1145/3368691.3368732
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Oyenike Mary Olanrewaju, Abdulwasiu Adebayo Abdulhafeez Abdulwasiu, Abdulhafiz Nuhu
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.