Securing ad hoc on-demand distance vector routing protocol against the black hole DoS attack in MANETs

Computer Science, Institute of Social Policy and Research, Peshawar, Not Specified, Pakistan
Computer Science, Iqra National University, Peshawar, KPK, Pakistan
Computer Science, University of Malakand, Peshawar, Not Specified, Pakistan
Ultimate Consultancy, Peshawar, Not Specified, Pakistan
Electrical Engineering, Iqra National University,Peshawar, Peshawar, KPK, Pakistan
DOI
10.7287/peerj.preprints.27905v1
Subject Areas
Algorithms and Analysis of Algorithms, Computer Architecture, Computer Networks and Communications
Keywords
AODV, Routing Protocol, Black-Hole, Denial of service attack, Mobile Ad hoc network, MANET
Copyright
© 2019 Tariq et al.
Licence
This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Preprints) and either DOI or URL of the article must be cited.
Cite this article
Tariq R, Ahmed S, Sani RS, Najam Z, Shafique S. 2019. Securing ad hoc on-demand distance vector routing protocol against the black hole DoS attack in MANETs. PeerJ Preprints 7:e27905v1

Abstract

Mobile Ad hoc network is the collection of nodes without having any physical structure involved i.e. access points, routers etc. MANETs are wide-open to similar forms of threats as other wireless mobile communication systems. In Ad-hoc Network nodes performing both as end-points of the communication and routers which makes the Ad-hoc routing protocols further prone towards the security attacks. Black Hole attack is a common security issue encountered in MANET routing protocols. The Black-Hole attack is security attack in which a malicious node imposters themselves as a node with the shortest hop count to the destination node during a packet transmission. A malicious node is capable of disturbing the network with Black Hole attack pretends to have the minimum hop-count route to the destination node (DS). This node responds to all route requests (RREQ) messages in positive and thus catches all the transmission to it. The source node (SN) not knowing the malicious nature of the Black-Hole node thus transmits all the important data. The Black Hole node discards all the important data packets. In this paper a comparatively effective, efficient and easy implemented way for identifying and therefore eluding the attacks of Black-Hole in mobile Ad-hoc networks is presented. The Network Simulator (NS-2) has been used for the implementation of our proposed solution to assess its work in terms of Network Routing load, End-to-End delay and Packet delivery ratio. The results show a considerable improvement in the performance metrics.

Author Comment

This is a submission to PeerJ Computer Science for review.

Supplemental Information

Code of the simulations

Code of Paper Simulations

DOI: 10.7287/peerj.preprints.27905v1/supp-1