Skip to main content
Log in

A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile Ad hoc network (MANET) is a wireless network which is characterized by dynamic network topology, open medium, multi-hop communication etc. in which each device not only acts as a router but also as a host. Security in the mobile ad-hoc network is one of the most sought-after research topic. The performance of MANET is greatly affected by the presence of malicious nodes in the network. One of the most common attacks in MANET is a denial of service attack in which the source node is not able to communicate with the destination node due to malicious behaviour of the node. The malicious node which drops the packet is known as a black-hole node. In order to mitigate the black-hole attack problem, various techniques have been used by many researchers. In this paper, based on a dynamic sequence number threshold value, MBDP-AODV protocol is used. The main contribution of this paper is the performance evaluation of MBDP-AODV protocol under black-hole attack. Through simulation, it has been found that MBDP-AODV protocol is able to mitigate the impact of black-hole attack under different network density. Although it improves the network performance in terms of packet delivery, throughput and reduces the normalized routing load but it has high routing overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Balaji, S., & Rajaram, M. (2016). SIPTAN: Securing inimitable and plundering track for ad hoc network. Wireless Personal Communications. https://doi.org/10.1007/s11277-016-3187-y.

    Google Scholar 

  2. Eissa, T., Razak, S. A., Khokhar, R. H., & Samian, N. (2013). Trust-based routing mechanism in MANET: Design and implementation. Mobile Networks and Applications. https://doi.org/10.1007/s11036-011-0328-0.

    Google Scholar 

  3. Jhaveri, R. H., Patel, S. J. & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey, In IEEE 2nd International Conference on Advanced Computing & Communication Technologies.

  4. Singh, T., Singh, J., & Sharma, S. (2016). Energy efficient secured routing protocol for MANETs. Wireless Network. https://doi.org/10.1007/s11276-015-1176-9.

    Google Scholar 

  5. Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-016-3318-5.

    Google Scholar 

  6. Gurung, S., & Chauhan, S. (2017). A dynamic based approach for mitigating black-hole attack in MANET. Wireless Network. https://doi.org/10.1007/s11276-017-1514-1.

    Google Scholar 

  7. Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2015). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Network. https://doi.org/10.1007/s11276-015-1032-y.

    Google Scholar 

  8. Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE International Conference on WiSPNET (pp. 2409–2415).

  9. Li, C., Wang, Z., & Yang, C. (2010). SEAODV: A security enhanced AODV routing protocol for wireless mesh networks. In IEEE International Workshop on Selected Topics in Mobile and Wireless Computing (pp. 699–706).

  10. Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE 9th Malaysia International Conference (pp. 530–535). https://doi.org/10.1109/MICC.2009.5431439.

  11. Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications, 35(3), 1130–1139.

    Article  Google Scholar 

  12. Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Systems, Modelling and Simulation (ISMS) (pp. 338–343).

  13. Vadhana, S. K. & Paramasivan, B. (2015). Ant based defense mechanism for selective forwarding attack in MANET. In IEEE ICDE Workshops (pp. 92–97).

  14. Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K., & Banerjee, P. K. (2012). Two-level secure re-routing (TSR) in mobile ad hoc networks. In International Conference on Advances in Mobile Network, Communication and Its Applications (pp. 119–122).

  15. Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Proceedings of IEEE Conference on Information and Communication Technologies (pp. 479–484).

  16. Gurung, S., & Chauhan, S. (2016). A novel approach for mitigating grayhole attack in MANET. Wireless Network. https://doi.org/10.1007/s11276-016-1353-5.

    Google Scholar 

  17. Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75.

    Article  Google Scholar 

  18. Gurung, S, Saluja, K. K. (2014). Mitigating impact of blackhole attack in MANET. In Proceedings of 5th, ACEEE International Conference on Recent Trends in Information, Telecommunication and Computing, ITC (pp. 229–237).

  19. The Network Simulator-NS-2.35 (2016). http://www.isi.edu/nsnam/ns/.

  20. Gurung, S., & Chauhan, S. (2017). A novel approach for mitigating flooding attack in MANET. Wireless Network. https://doi.org/10.1007/s11276-017-1515-0.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shashi Gurung.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gurung, S., Chauhan, S. A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET. Wireless Netw 25, 1685–1695 (2019). https://doi.org/10.1007/s11276-017-1622-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1622-y

Keywords

Navigation