Ad Hoc On-demand Distance Vector Inherent Techniques Comparison for Detecting and Eliminating the Black Hole Attack Nodes in Mobile Ad Hoc Network
It is important to connect wirelessly a group of moving mobile nodes together in a static or dynamic form, to transfer digital data between them, this form known as a mobile ad hoc network. This private network can be used in different essential situations where it depends on each connected mobile node to deliver and pass the data between them, without any fixed access point or router. Unfortunately, there are different types of attacks that can affect these nodes, and steal or corrupt the data inside, one of these attacks called the black hole attack. In this paper, a compared study will be done between two major innovative techniques derived from the ad hoc on-demand distance vector routing protocol to avoid the black hole attack; the paper will compare the two techniques in delay, throughput and packet dropping efficacy.
S. B. Sharma and N. Chauhan. “Security Issues and Their Solutions in MANET”. IEEE International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), pp. 289-294, 2015.
R. Sheikh, M. S. Chande and D. K. Mishra. “Security Issues in MANET: A Review”. IEEE 7th International Conference on Wireless and Optical Communications Networks, pp. 1-4, 2010.
M. N. Alslaim, H. A. Alaqel and S. S. Zaghloul. “A Comparative Study of MANET Routing Protocols”. IEEE 3rd International Conference on E-Technologies and Networks for Development, 2014, pp. 178-182.
M. Chitkara and M. W. Ahmad. “Review on MANET: Characteristics, challenges, imperatives and routing protocols”. International Journal of Computer Science and Mobile Computing, vol. 3, no. 2, pp. 432-437, 2014.
R. Shenbagapriya and N. Kumar. “A Survey on Proactive Routing Protocols in MANETs”. IEEE 2014 International Conference on Science Engineering and Management Research, pp. 1-7, 2014.
D. N. Patel, S. B. Patel, H. R. Kothadiya, P. D. Jethwa and R. H. Jhaveri. “A Survey of Reactive Routing Protocols in MANET”. IEEE International Conference on Information Communication and Embedded Systems, pp. 1-6, 2014.
R. Dilli and P. C. S. Reddy. “Trade-off between Length of the Hash Code and Performance of Hybrid Routing Protocols in MANETs”. IEEE 2nd International Conference on Applied and Theoretical Computing and Communication Technology, pp. 732-735, 2016.
A. Dorri, S. R. Kamel and E. Kheirkhah. “Security challenges in mobile ad hoc networks: A survey”. International Journal of Computer Science and Engineering Survey, vol. 6, no. 1, 15-29, 2015.
M. M. Alani. “MANET Security: A Survey”. IEEE International Conference on Control System, Computing and Engineering, pp. 559-564, 2014.
M. Kuzlu, M. Pipattanasomporn and S. Rahman. “Communication network requirements for major smart grid applications in HAN, NAN and WAN”. Computer Networks, vol. 67, pp. 74-88, 2014.
R. Ranjan, N. K. Singh and A. Singh. “Security Issues of Black Hole Attacks in MANET. IEEE International Conference on Computing”. Communication and Automation, pp. 452-457, 2015.
M. S. El-Azhari, O. A. Al-Amoudi, M. Woodward and I. Awan. “Performance analysis in AODV Based Protocols for MANETS”. IEEE International Conference on Advanced Information Networking and Applications Workshops, pp. 187-192, 2009.
M. B. M. Kamel, I. Alameri and A. N. Onaizah. “STAODV: A Secure and Trust Based Approach to Mitigate Black Hole Attack on AODV Based MANET”. IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference, pp. 1278-1282, 2017.
A. Dorri. “An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET”. Wireless Networks, vol. 23, no. 6, 2017, pp. 1767-1778.
Copyright (c) 2020 Ghassan A. Qasmarrogy, Yazen S. Almashhadani
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).