User:Roshan helonde/sandbox

BLACK HOLE ATTACK ON AODV

In AODV[1], Dst Seq is used to determine the freshness of routing information contained in the message from originating node. To succeed in the black hole attack[1] the attacker must generate its RREP with Dst Seq greater than the Dst Seq of the destination node. Here, we assume that the destination node D has no connections with other nodes. The source node S constructs a route in order to communicate with destination node D.Upon receiving RREQ (a1), node A forwards RREQ (b1) since it is not the destination node. To impersonate the destination node, the attacker M sends spoofed RREP(e1) shown in Table 1 with IPSec, AODV.Dst [11] the same with D and increased Dst Seq (in this case 65 as) to source node S.

[1]	Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting Black hole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network  Security, Vol.5, issue 3, Nov 2007, pp 338–346.

[2]	William Stallings “Wireless Communication & Networks” (Pearson Education). Rajkamal “Mobile Computing”Oxford Press.

[3]	Agrawal D.P., Zeng Q, A, “Introduction to Wireless & Mobile Systems” (2/e) CENGAGE Learning.

[4]	J.M.L. Manickam and S. Shanmugavel, "Fuzzy Based Trusted Ad Hoc On-demand Distance Vector Routing Protocol for MANET", IEEE in Proc. WiMob, 2007.

[5]	Fuzzy Logic with Engineering Applications by Timothy J. Ross Mcgraw Hill, Inc.

[6]	Timothy J. Ross,(I2000) “Fuzzy Logic with Engineering Applications”,McGraw Hill International Editions.

[7]	Payal N. Raj and Prashant B. Swadas, “DPRAODV: A dynamic learning system against black hole attack in AODV based MANET”, International Journal of Computer Science Issues (IJCSI), Volume 2, Numbe 3, 2009, pp 54-59.

[8]	Kulbhushan and Jagpreet Singh, “Fuzzy Logic based Intrusion Detection Syste against Blackhole Attack on AODV in MANET”, IJCA  Special Issue on “Network Security and Cryptography” NSC, 2011.

[9]	Poonam Yadav, Rakesh Kumar Gill and Naveen Kumar, “A Fuzzy Based Approach to Detect Black hole Attack”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-2, Issue -3, July 2012.

[10]	Miss. Shweta Modi and Mr. Jitendra  Prithviraj, “Performance Comparison of IACO, AODV Networking Routing Protocols”, International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN), 2011.

[11]	Zaiba Ishrat, “Security issues, challenges & Solution in MANET”, International Journal of Computer Sci ence & Technology (IJCST), Vol- 2, Iss ue- 4, Oct  - Dec 2011.

[12]	Arash Dana and Mohamad Hadi Babaei, “A Fuzzy Based Stable Routing Algorithm for MANET”, International Journal of Computer Science Issues (IJCSI), ISSN: 1694-0814, Vol 8, Issue-1, January 2011.

[13]	Prof.S.P. Setti, Vijay Kumar D V, Nagendra Prasad G S M and Narasimha Raju  K, “Implementation of Fuzzy Priority Scheduler for MANET and Performance Analysis with Reactive Protocols”, International Journal of Engineering Science and Technology, Vol. 2(8), 2010,pp 3635-3640.