Ad Hoc On-demand Distance Vector Inherent Techniques Comparison for Detecting and Eliminating the Black Hole Attack Nodes in Mobile Ad Hoc Network

  • Ghassan A. Qasmarrogy Department of Communication and Computer Engineering, Cihan University-Erbil, Kurdistan Region, Iraq
  • Yazen S. Almashhadani Department of Communication and Computer Engineering, Cihan University-Erbil, Kurdistan Region, Iraq
Keywords: Black hole attack, Extended data routing information technique, Mobile ad hoc network, Secure ad hoc on-demand distance vector routing protocol, Trusted ad hoc on-demand distance vector

Abstract

It is important to connect wirelessly a group of moving mobile nodes together in a static or dynamic form, to transfer digital data between them, this form known as a mobile ad hoc network. This private network can be used in different essential situations where it depends on each connected mobile node to deliver and pass the data between them, without any fixed access point or router. Unfortunately, there are different types of attacks that can affect these nodes, and steal or corrupt the data inside, one of these attacks called the black hole attack. In this paper, a compared study will be done between two major innovative techniques derived from the ad hoc on-demand distance vector routing protocol to avoid the black hole attack; the paper will compare the two techniques in delay, throughput and packet dropping efficacy.

Downloads

Download data is not yet available.

References

S. B. Sharma and N. Chauhan. “Security Issues and Their Solutions in MANET”. IEEE International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), pp. 289-294, 2015.

R. Sheikh, M. S. Chande and D. K. Mishra. “Security Issues in MANET: A Review”. IEEE 7th International Conference on Wireless and Optical Communications Networks, pp. 1-4, 2010.

M. N. Alslaim, H. A. Alaqel and S. S. Zaghloul. “A Comparative Study of MANET Routing Protocols”. IEEE 3rd International Conference on E-Technologies and Networks for Development, 2014, pp. 178-182.

M. Chitkara and M. W. Ahmad. “Review on MANET: Characteristics, challenges, imperatives and routing protocols”. International Journal of Computer Science and Mobile Computing, vol. 3, no. 2, pp. 432-437, 2014.

R. Shenbagapriya and N. Kumar. “A Survey on Proactive Routing Protocols in MANETs”. IEEE 2014 International Conference on Science Engineering and Management Research, pp. 1-7, 2014.

D. N. Patel, S. B. Patel, H. R. Kothadiya, P. D. Jethwa and R. H. Jhaveri. “A Survey of Reactive Routing Protocols in MANET”. IEEE International Conference on Information Communication and Embedded Systems, pp. 1-6, 2014.

R. Dilli and P. C. S. Reddy. “Trade-off between Length of the Hash Code and Performance of Hybrid Routing Protocols in MANETs”. IEEE 2nd International Conference on Applied and Theoretical Computing and Communication Technology, pp. 732-735, 2016.

A. Dorri, S. R. Kamel and E. Kheirkhah. “Security challenges in mobile ad hoc networks: A survey”. International Journal of Computer Science and Engineering Survey, vol. 6, no. 1, 15-29, 2015.

M. M. Alani. “MANET Security: A Survey”. IEEE International Conference on Control System, Computing and Engineering, pp. 559-564, 2014.

M. Kuzlu, M. Pipattanasomporn and S. Rahman. “Communication network requirements for major smart grid applications in HAN, NAN and WAN”. Computer Networks, vol. 67, pp. 74-88, 2014.

R. Ranjan, N. K. Singh and A. Singh. “Security Issues of Black Hole Attacks in MANET. IEEE International Conference on Computing”. Communication and Automation, pp. 452-457, 2015.

M. S. El-Azhari, O. A. Al-Amoudi, M. Woodward and I. Awan. “Performance analysis in AODV Based Protocols for MANETS”. IEEE International Conference on Advanced Information Networking and Applications Workshops, pp. 187-192, 2009.

M. B. M. Kamel, I. Alameri and A. N. Onaizah. “STAODV: A Secure and Trust Based Approach to Mitigate Black Hole Attack on AODV Based MANET”. IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference, pp. 1278-1282, 2017.

A. Dorri. “An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET”. Wireless Networks, vol. 23, no. 6, 2017, pp. 1767-1778.

Published
2020-01-20
How to Cite
1.
Qasmarrogy G, Almashhadani Y. Ad Hoc On-demand Distance Vector Inherent Techniques Comparison for Detecting and Eliminating the Black Hole Attack Nodes in Mobile Ad Hoc Network. cuesj [Internet]. 20Jan.2020 [cited 24Apr.2024];4(1):77-1. Available from: https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/127
Section
Research Article