Implementing Enhanced AODV Protocol to Prevent Black hole Attack in Mobile Ad hoc Networks

No Thumbnail Available

Date

2011-11

Journal Title

Journal ISSN

Volume Title

Publisher

Addis Ababa University

Abstract

Mobile ad-hoc networks are sel f-configuring networks of mobi le devices that can be establi shed wi thout a need for a network infrastructure. The faci that mobile ad-hoc networks lack central administrat ion and use wireless link for communication makes them very susceptible to various types of adversary's malicious attacks. Black hole attack is one of the severe security threats in ad-hoc networks that can be eas ily performed by exploi ting vulnerability of on-demand routi ng protocols s lIch as AODV. We implemented a solution to prevent black hole attac ks imposed by both single and multiple black hole nodes. Intrusion Detection lIsing Anomaly Detection (lOAD), works based on a general principle of Intrusion Detection Systems (IDS). It means an lOAD system identifies anomaly activities of an adversa ry from normalcy act ivities of nonmalic ious mobile nodes. The identification process in volves comparing communication attributes of each mobile node part icipating in a given ad-hoc network. The most distinguishing characteristic of lOAD is that it works in no-peer-t rust principle. Unlike the ex isti ng black hole attack prevention techniques that rely on the cooperation of mobile nodes to announce a presence of intrusion, lOAD enab les each mobile node to protect itself from an intruder. Implcmentation of the prevention mechanism has been carried out by usin g the Network Simulation version 2 (NS2). A Java Parser program and Tracegraph has also been used to analyze results of simulation. Post-analysis result proves the preven tion method implemcnted maxi mi zes network performance by effectively preventing black hole attacks again st mobi le ad-hoc networks as wetl us mini mi zing generation of control (routing) pac kets.

Description

Keywords

MANET, Black hoIe, IDAD, AODV, IDS

Citation