Open Access Open Access  Restricted Access Subscription Access

A Survey of Current Detection and Prevention Techniques for Black Hole Attack in AODV of MANET


Affiliations
1 Systems and Computer Engineering Department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt
 

“Mobile Ad Hoc Network” (MANET) comprises a set of mobile nodes that communicate wirelessly and operate in a self-organized environment that requires no infrastructure. This network type dynamically forms its topology in which the nodes' mobility leads to rapid, unpredictable, and frequent changes in the dedicated topology. Routing process in such environment is a challenge. In addition, the lack of centralization administration makes MANET subject to intrusions. “Ad Hoc On-Demand Distance Vector” (AODV) protocol is among the most widely deployed routing protocol in MANET. Unfortunately, is susceptible to black hole attacks in which intruders utilize the protocol nature to infiltrate the network and execute their malicious activities. Therefore, the paper discusses and analyzes the latest existed solutions used to protect against black hole attacks. In addition, it categorizes the current solutions according to the deployed technology to provide the reader with state-of-the-art approaches.

Keywords

AODV, Attack, Black Hole, MANET, Malicious, Reputation, Route Discovery, RREP, RREQ, Sequence Number, Trust Value.
User
Notifications
Font Size

  • Kaur, J. Kaur and N. Kansal, "“D-EPAR: Distance–Efficient Power Aware Routing Protocol for MANETs”," 2nd International Conference on Next Generation Computing Technologies, 2016.
  • M. A. Ryan, S. Nouh, T. M. Salem and A. M. Naguib, ""EDA-AODV: Energy and Distance Aware "AODV" Routing Protocol"," International Journal of Computer Networks and Applications (IJCNA), vol. 5, no. 5, pp. 61 - 69, 2018.
  • A. Lee, C. G.Laviña, J. Caballero and I. Ra, "Performance Analysis of Ad-Hoc Routing Protocols Based on Selective Forwarding Node Algorithms," in IEEE conference, CO. U.S.A, 2013.
  • S. K.S. and S. S., "Performance evaluation of routing in MANETs based on QoS parameters," International Journal of Modern Computer Science and Applications (IJMCSA), Vols. Volume No.-4, no. Issue No.-1, pp. pp. 49-54, 2016.
  • S. K. Sharma and S. Sharma, "Improvement over AODV Considering QoS Support in Mobile Ad-hoc Networks," International Journal of Computer Networks and Applications (IJCNA), vol. 4, no. 2, 2017.
  • J. and H. N., "Efficient Routing Protocol (DSDV) for Mobile Ad Hoc Network," nternational Journal of Soft Computing and Engineering (IJSCE), vol. 3, 2013.
  • V. Jayanthi and R. R. Ravi, "Energy Efficient Neighbor Coverage Protocol for Reducing Rebroadcast in MANET," Science Direct, vol. 47, pp. 417-423, 2015.
  • S. K. Sarkar, T. G. Basavaraju and C. Puttamadappa, Ad Hoc Mobile Wireless Networks. Principle, Protocols and Applications, Florida: Taylor & Francis Group, 2008.
  • P. Mittal, S. Batra and D. C. K. Nagpal, "Implementation of Novel Protocol for Cordination of Nodes in Manet," International Journal of Computer Networks and Applications (IJCNA), vol. 2, no. 2, 2015.
  • J. Loo, J. L. Mauri and J. , Mobile Ad Hoc Networks Current Status and Future Trends, Florida: Tylor and Francis Group, 2012.
  • A. N. Thakare and M. M. Y. Joshi, "Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad hoc Networks," IJCA Special Issue on MANETs, vol. 4, p. 211–218, 2010.
  • J. S. Shaik, Simulation-Based Comparative Study of Routing, Sweden , Karlskrona, 2014.
  • -h. Lee, J. -h. Oh and J. -i. Jung, "An Enhanced Selective Forwarding Scheme for Real-Time Applications in MANETs," in 2011 International Conference on Information Science and Applications, Jeju, Korea (South), 2011.
  • N. G. Patel and M. A. Dadhaniya, "A Survey on Detecting Black Hole Attack in MANETs," IJSRD - International Journal for Scientific Research & Development, vol. 1, no. 10, 2014.
  • A. M. El-Semary and M. M. Abdel-Azim, "New Trends in Secure Routing Protocols for Wireless Sensor Networks," International Journal of Distributed Sensor Networks, vol. 9, no. 5, 2013.
  • M. koravand, "A Comprehensive Study on Defense Against Network Layer Attacks in Mobile Ad hoc Networks," International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 10, pp. 766-773, 2016.
  • J. Sen, M. G. Chandra, S. G. Harihara, H. Reddy and P. Balamuralidhar, "A mechanism for detection of gray hole attack in mobile Ad Hoc networks," in 6th International Conference on Information, Communications & Signal Processing, Singapore, 2007.
  • J. Rahman, F. Ahmed and S. Rashid, "An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network using HTTP Traffic," International Journal of Research and Engineering, vol. 6, no. 2, pp. 575 - 579, 2019.
  • A. Bhattercharjee and S. Paul., "A Review on some aspects of Black Hole Attack in MANET," International Journal of Engineering Trends and Technology (IJETT), vol. 10, pp. 396-401, 2014.
  • F.-H. Tseng, L.-D. Chou and H.-C. Chao, "A survey of black hole attacks in wireless mobile," Hum. Cent. Comput. Inf. Sci., vol. 1, no. 4, 2011.
  • U. Singh, M. Samvatsar, A. Sharma and A. K. Jain, "Detection and avoidance of unified attacks on MANET using trusted secure AODV routing protocol," in Symposium on Colossal Data Analysis and Networking (CDAN), Indore, India, 2016.
  • A. M. El-Semary and H. Diab, "BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map," IEEE Access, vol. 7, pp. 95197-95211, 2019.
  • P. Gupta, P. Goel, P. Varshney and N. Tyagi, "Reliability Factor Based AODV Protocol: Prevention of Black Hole Attack in MANET," Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol. 851, 2018.
  • S. Singh, A. Mishra and U. Singh, "Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm," in Symposium on Colossal Data Analysis and Networking (CDAN), Indore, India, 2016.
  • J. Thakker, J. Desai and L. Ragha, "Avoidance of co-operative black hole attack in AODV in MANET," in International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016.
  • A. Yamini, J. Stephy, S. Kannan and V. Ravi, "Improving routing disruption attack detection in MANETs using efficient trust establishment," Transactions on Emerging Telecommunications Technologies , 2022.
  • N. Choudhary and L. Tharani, "Preventing Black Hole Attack in AODV using timer-based detection mechanism," in International Conference on Signal Processing and Communication Engineering Systems, Guntur, India, 2015.
  • M. B. M. Kamel, I. Alameri and A. N. Onaizah, "STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET," in IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 2017.
  • S. Shahabi, M. Ghazvini and M. Bakhtiarian , "A modified algorithm to improve security and performance of AODV protocol against black hole attack," Wireless Netw, p. 1505–1511, 2016.
  • J. RYU and S. KIM, "Reputation-Based Opportunistic Routing Protocol Using Q-Learning for MANET Attacked by Malicious Nodes," IEEE Access, vol. 11, pp. 47701-47711, 2023.
  • K. V. Anand and G. A. Thangaraja, "A Competent Intelligence Modeling for Trust-Based Security Scheme in Mobile Ad Hoc Network," International Journal of Computer Networks and Applications (IJCNA), vol. 9, no. 6, pp. 736-745, 2022.
  • S. Kurian and L. Ramasamy, "Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET)," International Journal of Computer Networks and Applications (IJCNA), vol. 8, no. 5, pp. 619-633, 2021.
  • M. Shukla and B. K. Joshi, "An Effective Scheme to Mitigate Blackhole Attack in Mobile Ad Hoc Networks," Lecture Notes in Electrical Engineering, Springer, vol. 869, 2022.
  • S. Shafi, S. Mounika and S. Velliangiri, "Machine Learning and Trust Based AODV Routing Protocol to Mitigate Flooding and Blackhole Attacks in MANET," Procedia Computer Science, vol. 218, pp. 2309-2318, 2023.
  • A. Kumari, S. Dutta and S. Chakraborty, "Detection and Prevention of Black Hole Attack in MANET using Node Credibility and Andrews Plot," Research Square, 2023.
  • V. Dani, P. Kokate and J. Umre, "STABA: Secure Trust Based Approach for Black-Hole Attack Detection," Applications of Artificial Intelligence and Machine Learning. Lecture Notes in Electrical Engineering.Springer, Singapore, vol. 925, 2022.
  • G. Farahani, "Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks," Security and Communication Networks, 2021.
  • S. V. Vasantha and A. Damodaram, "Bulwark AODV against Black hole and Gray hole attacks in MANET," in IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, India, 2015.
  • S. Shrestha, R. Baidya, B. Giri and A. Thapa, "Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol," in 8th International Electrical Engineering Congress (iEECON), Chiang Mai, Thailand, 2020.
  • A. Ram, J. Kulshrestha and V. Gupta, "Secure Routing-Based AODV to Prevent Network from Black Hole Attack in MANET," in Proceedings of 6th International Conference on Recent Trends in Computing. Lecture Notes in Networks and Systems, Singapore, 2021.
  • S. Lu, L. Li, K. -Y. Lam and L. Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack," in International Conference on Computational Intelligence and Security, Beijing, China, 2009.
  • R. Choudhury, L. Ragha and N. Marathe, "Implementing and Improving the Performance of AODV by Receive Reply Method and Securing it from Black Hole Attack," Procedia Computer Science, vol. 45, pp. 564-570, 2015.
  • S. Gurung and S. Chauhan, "A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET," Wireless Netw 25, p. 1685–1695, 2019.
  • M. Abu Zant and A. Yasin, "Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique," Wireless Communications and Mobile Computing, pp. 1-10, 2018.
  • U. M. K and A. S. Poornima, "Node-to-node authentication protocol to prevent black hole attack in AODV," in International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016.
  • S. Dhende, S. Musale, S. Shirbahadurkar and A. Najan, "SAODV: Black hole and gray hole attack detection protocol in MANETs," in International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2017.
  • S. R. Deshmukh, P. N. Chatur and N. B. Bhople, "AODV-based secure routing against blackhole attack in MANET," in IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, 2016.
  • A. K. Jain and V. Tokekar, "Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks," in International Conference on Pervasive Computing (ICPC), Pune, India, 2015.
  • Q. M. Yaseen and M. Aldwairi, "An Enhanced AODV Protocol for Avoiding Black Holes in MANET," Procedia Computer Science, vol. 134, pp. 371-376, 2018.
  • V. Kumar, M. Shanker, A. M. Tripathi, V. Yadav, A. K. Rai, U. Khan and M. Rahul, "Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme," Journal of Scientific & Industrial Research, vol. 81, pp. 1061-1072, 2022.
  • M. Shukla, B. K. Joshi2 and U. Singh, "Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET," Wireless Personal Communications, p. 503–526, 2021.
  • A. Abdelhamid , M. S. Elsayed, A. D. Jurcut and M. A. Azer, "A Lightweight Anomaly Detection System for Black Hole Attack," Electronics, vol. 12, no. 6, 2023.
  • Ahmed, T. Abdelaziz and S. B. Hacene, "Mitigate Black Hole Attack Using the Reply Generation Time In MANET," Turkish Journal of Computer and Mathematics Education, vol. 13, no. 3, pp. 466-487, 2022.
  • O. M. Olanrewaju, A. A. Abdulwasiu and N. Abdulhafiz, "Enhanced On-demand Distance Vector Routing Protocol to prevent Blackhole Attack in MANET," International Journal of Software Engineering and Computer Systems, vol. 9, no. 1, p. 68 – 75, 2023.
  • S. Sivanesh and V. R. S. Dhulipala, "Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc Networks," Wireless Pers Commun, vol. 124, p. 1511–1524, 2021. How to cite this article:
  • V. Jebaseelan and K. K. Raju, "Protecting MANETs from Black and Gray Hole Attacks Through a Detailed Detection System," International Journal of Intelligent Engineering & Systems (INASS), vol. 15, no. 6, 2022.

Abstract Views: 143

PDF Views: 2




  • A Survey of Current Detection and Prevention Techniques for Black Hole Attack in AODV of MANET

Abstract Views: 143  |  PDF Views: 2

Authors

Mohamed A. Ryan
Systems and Computer Engineering Department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt
Sayed Nouh
Systems and Computer Engineering Department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt
Aly M. El-Semary
Systems and Computer Engineering Department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt

Abstract


“Mobile Ad Hoc Network” (MANET) comprises a set of mobile nodes that communicate wirelessly and operate in a self-organized environment that requires no infrastructure. This network type dynamically forms its topology in which the nodes' mobility leads to rapid, unpredictable, and frequent changes in the dedicated topology. Routing process in such environment is a challenge. In addition, the lack of centralization administration makes MANET subject to intrusions. “Ad Hoc On-Demand Distance Vector” (AODV) protocol is among the most widely deployed routing protocol in MANET. Unfortunately, is susceptible to black hole attacks in which intruders utilize the protocol nature to infiltrate the network and execute their malicious activities. Therefore, the paper discusses and analyzes the latest existed solutions used to protect against black hole attacks. In addition, it categorizes the current solutions according to the deployed technology to provide the reader with state-of-the-art approaches.

Keywords


AODV, Attack, Black Hole, MANET, Malicious, Reputation, Route Discovery, RREP, RREQ, Sequence Number, Trust Value.

References





DOI: https://doi.org/10.22247/ijcna%2F2023%2F223691