Detection and Prevention of Blackhole Attack in the AOMDV Routing Protocol

Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as a host and router. Mobile ad-hoc networks are characterized by the lack of preexisting infrastructures or centralized administration. So, they are vulnerable to several types of attacks, especially the Black...

Full description

Permalink: http://skupnikatalog.nsk.hr/Record/nsk.NSK01001163183/Details
Matična publikacija: Journal of communications software and systems (Online)
17 (2021), 1 ; str. 1-12
Glavni autori: Tami, Abdelaziz (Author), Boukli Hacene, Sofiane, Ali Cherif, Moussa
Vrsta građe: e-članak
Jezik: eng
Online pristup: https://doi.org/10.24138/jcomss.v17i1.945
Elektronička verzija članka
Elektronička verzija članka
LEADER 03153naa a22003494i 4500
001 NSK01001163183
003 HR-ZaNSK
005 20230213113254.0
006 m d
007 cr||||||||||||
008 230213s2021 ci |o |0|| ||eng
024 7 |2 doi  |a 10.24138/jcomss.v17i1.945 
035 |a (HR-ZaNSK)001163183 
040 |a HR-ZaNSK  |b hrv  |c HR-ZaNSK  |e ppiak 
041 0 |a eng 
042 |a croatica 
044 |a ci  |c hr 
080 1 |2 2011 
100 1 |a Tami, Abdelaziz  |4 aut  |9 HR-ZaNSK 
245 1 0 |a Detection and Prevention of Blackhole Attack in the AOMDV Routing Protocol  |h [Elektronička građa]  |c Abdelaziz Tami, Sofiane Boukli Hacene, Moussa Ali Cherif. 
300 |b Ilustr. 
504 |a Bibliografija: 
504 |a Summary. 
520 |a Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as a host and router. Mobile ad-hoc networks are characterized by the lack of preexisting infrastructures or centralized administration. So, they are vulnerable to several types of attacks, especially the Blackhole attack. This attack is one of the most serious attacks in this kind of mobile networks. In this type of attack, the malicious node sends a false answer indicating that it has the shortest path to the destination node by increasing the sequence number and decreasing the number of hops. This will have a significant negative impact on source nodes which send their data packets through the malicious node to the destination. This malicious node drop received data packets and absorbs all network traffic. In order overcome this problem, securing routing protocols become a very important requirement in mobile ad-hoc networks. Multipath routing protocols are among the protocols affected by the Blackhole attack. In this paper, we propose an effective and efficient technique that avoids misbehavior of Blackhole nodes and facilitates the discovery for the most reliable paths for the secure transmission of data packets between communicating nodes in the well-known Ad hoc On-demand multi-path routing protocol (AOMDV). We implement and simulate our proposed technique using the ns 2.35 simulator. We also compared on how the three routing protocols AOMDV, AOMDV under Blackhole attack (BHAOMDV), and the proposed solution to counter the Blackhole attack (IDSAOMDV) performs. The results show the degradation on how AOMDV under attack performs, it also presents similarities between normal AOMDV and the proposed solution by isolating misbehaving node which has resulted in increase the performance metrics to the standard values of the AOMDV protocol. 
700 1 |a Boukli Hacene, Sofiane  |4 aut  |9 HR-ZaNSK 
700 1 |a Ali Cherif, Moussa  |4 aut  |9 HR-ZaNSK 
773 0 |t Journal of communications software and systems (Online)  |x 1846-6079  |g 17 (2021), 1 ; str. 1-12  |w nsk.(HR-ZaNSK)000644741 
981 |b Be2021 
856 4 0 |u https://doi.org/10.24138/jcomss.v17i1.945 
856 4 0 |u https://jcoms.fesb.unist.hr/10.24138/jcomss.v17i1.945/  |y Elektronička verzija članka 
856 4 0 |u https://jcoms.fesb.unist.hr/pdfs/v17n1_945_tami.pdf  |y Elektronička verzija članka 
856 4 1 |y Digitalna.nsk.hr