Implementing Enhanced AODV Protocol to Prevent Black hole Attack in Mobile Ad hoc Networks

dc.contributor.advisorEjigu PhD, Dejene
dc.contributor.authorGebremeskel, Solomon
dc.date.accessioned2022-02-11T10:47:13Z
dc.date.accessioned2023-11-29T04:06:41Z
dc.date.available2022-02-11T10:47:13Z
dc.date.available2023-11-29T04:06:41Z
dc.date.issued2011-11
dc.description.abstractMobile ad-hoc networks are sel f-configuring networks of mobi le devices that can be establi shed wi thout a need for a network infrastructure. The faci that mobile ad-hoc networks lack central administrat ion and use wireless link for communication makes them very susceptible to various types of adversary's malicious attacks. Black hole attack is one of the severe security threats in ad-hoc networks that can be eas ily performed by exploi ting vulnerability of on-demand routi ng protocols s lIch as AODV. We implemented a solution to prevent black hole attac ks imposed by both single and multiple black hole nodes. Intrusion Detection lIsing Anomaly Detection (lOAD), works based on a general principle of Intrusion Detection Systems (IDS). It means an lOAD system identifies anomaly activities of an adversa ry from normalcy act ivities of nonmalic ious mobile nodes. The identification process in volves comparing communication attributes of each mobile node part icipating in a given ad-hoc network. The most distinguishing characteristic of lOAD is that it works in no-peer-t rust principle. Unlike the ex isti ng black hole attack prevention techniques that rely on the cooperation of mobile nodes to announce a presence of intrusion, lOAD enab les each mobile node to protect itself from an intruder. Implcmentation of the prevention mechanism has been carried out by usin g the Network Simulation version 2 (NS2). A Java Parser program and Tracegraph has also been used to analyze results of simulation. Post-analysis result proves the preven tion method implemcnted maxi mi zes network performance by effectively preventing black hole attacks again st mobi le ad-hoc networks as wetl us mini mi zing generation of control (routing) pac kets.en_US
dc.identifier.urihttp://etd.aau.edu.et/handle/123456789/30014
dc.language.isoenen_US
dc.publisherAddis Ababa Universityen_US
dc.subjectMANET, Black hoIe, IDAD, AODV, IDSen_US
dc.titleImplementing Enhanced AODV Protocol to Prevent Black hole Attack in Mobile Ad hoc Networksen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Solomon Gebremeskel.pdf
Size:
12.97 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Plain Text
Description: