{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:10:27Z","timestamp":1654110627528},"reference-count":33,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7,1]]},"abstract":"<p>With the emergence of mobile ad-hoc networks, more users desire connectivity regardless of geographic location. MANETs are a promising technology in terms of the applications in the military, emergency situations, and general daily life activities. Various protocols have been developed to handle the routing information in such networks. However, most protocols are vulnerable to various threats. Among them, the Black-hole type of denial-of-service attack causes a major degradation in the performance and trust of the network nodes. In this paper, the authors review and highlight the limitations of the existing solutions and propose a new algorithm to handle the black-hole attacks. The proposed algorithm is comparatively efficient and easy to implement for detecting and avoiding the black-hole attacks. The proposed algorithm has been implemented in Network Simulator (ns-2) to evaluate its performance in term of packet delivery ratio, network load, and end-to-end delay. The simulation results show that the proposed algorithm achieves a considerable enhancement in the overall networking performance and avoids the black-hole attack successfully.<\/p>","DOI":"10.4018\/jtd.2012070106","type":"journal-article","created":{"date-parts":[[2013,8,6]],"date-time":"2013-08-06T13:18:44Z","timestamp":1375795124000},"page":"57-70","source":"Crossref","is-referenced-by-count":2,"title":["Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks"],"prefix":"10.4018","volume":"3","author":[{"given":"Raees","family":"Khan ShahSani","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Malakand, Chakdara, Pakistan"}]},{"given":"Muhammad","family":"Bakhsh","sequence":"additional","affiliation":[{"name":"Pakistan Academy for Rural Development, Peshawar, Pakistan"}]},{"given":"Amjad","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bahrain, Zallaq, Bahrain"}]}],"member":"2432","reference":[{"issue":"4","key":"jtd.2012070106-0","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/SURV.2008.080407","article-title":"A survey of secure mobile Ad Hoc routing protocols.","volume":"10","author":"L.Abusalah","year":"2008","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"jtd.2012070106-1","doi-asserted-by":"publisher","DOI":"10.1145\/313256.313272"},{"key":"jtd.2012070106-2","doi-asserted-by":"crossref","unstructured":"Ahmad, Z., Jalil, K. A., & Manan, J. A. (2011). Black hole effect mitigation method in AODV routing protocol. In Proceedings of the 7th International Conference on Information Assurance and Security (IAS-2011) (pp. 151-155).","DOI":"10.1109\/ISIAS.2011.6122811"},{"key":"jtd.2012070106-3","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S. M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. In Proceedings of the 42nd Annual Southeast Regional Conference, ACM-SE 42 (pp. 96-97).","DOI":"10.1145\/986537.986560"},{"key":"jtd.2012070106-4","doi-asserted-by":"crossref","unstructured":"Alem, Y. F., & Zhao-Cheng, X. (2010). Preventing black hole attack in mobile ad-hoc networks using anomaly detection. In Proceedings of the 2nd International Conference on Future Computer and Communication (ICFCC- 2010) (pp. 672-676).","DOI":"10.1109\/ICFCC.2010.5497455"},{"key":"jtd.2012070106-5","article-title":"Algorithms and protocols for wireless, mobile ad hoc networks","author":"A.Boukerche","year":"2009","journal-title":"Wiley Series on Parallel and Distributed Computing"},{"key":"jtd.2012070106-6","doi-asserted-by":"publisher","DOI":"10.1002\/9780470396384"},{"key":"jtd.2012070106-7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"jtd.2012070106-8","doi-asserted-by":"crossref","unstructured":"Douglas, A. D., De Couto, S. J., Bicket, J., & Morris, R. (2003). A high-throughput path metric for multi-hop wireless routing. In Proceedings of MobiCom 03, San Diego, CA (pp. 14-19).","DOI":"10.1145\/938985.939000"},{"issue":"1","key":"jtd.2012070106-9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.5120\/1439-1947","article-title":"A literature review of security attack in mobile ad-hoc networks.","volume":"9","author":"P.Goyal","year":"2010","journal-title":"International Journal of Computers and Applications"},{"key":"jtd.2012070106-10","doi-asserted-by":"crossref","unstructured":"Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Rushing attacks and defence in wireless ad hoc network routing protocols. In Proceedings of the ACM Workshop on Wireless Security.","DOI":"10.1145\/941311.941317"},{"issue":"1","key":"jtd.2012070106-11","first-page":"30","article-title":"Mitigation of black hole attacks for AODV routing protocol.","volume":"1","author":"K. A.Jalil","year":"2011","journal-title":"Society of Digital Information and Wireless Communications"},{"issue":"1","key":"jtd.2012070106-12","first-page":"45","article-title":"Modified AODV protocol against blackhole attacks in MANET.","volume":"2","author":"K.Lakshmi","year":"2010","journal-title":"International Journal of Engineering and Technology"},{"issue":"1","key":"jtd.2012070106-13","first-page":"45","article-title":"A counter measure to black hole attack on AODV- based mobile ad-hoc networks.","volume":"2","author":"S. C.Mandhata","year":"2011","journal-title":"International Journal of Computer & Communication Technology"},{"key":"jtd.2012070106-14","doi-asserted-by":"crossref","unstructured":"Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with black hole attack in AODV routing protocol in MANET. In Proceedings of the IEEE 9th Malaysia International Conference on Communications (MICC) (pp. 530-535).","DOI":"10.1109\/MICC.2009.5431439"},{"key":"jtd.2012070106-15","unstructured":"Ming-Yang, S., Kun-Lin, C., & Wei-Cheng, L. (2010). Mitigation of black-hole nodes in mobile ad hoc networks. In Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA- 2010) (pp. 162-167)."},{"key":"jtd.2012070106-16","doi-asserted-by":"crossref","unstructured":"Ning, P., & Sun, K. (2003). How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In Proceedings of the Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society.","DOI":"10.1109\/SMCSIA.2003.1232402"},{"issue":"1","key":"jtd.2012070106-17","first-page":"97","article-title":"AODV robust (AODVR): An analytic approach to shield ad-hoc networks from black holes.","volume":"2","author":"M. A.Obaida","year":"2011","journal-title":"International Journal of Advanced Computer Sciences and Applications"},{"key":"jtd.2012070106-18","doi-asserted-by":"crossref","unstructured":"Osathanunkul, K., & Ning, Z. (2011). A countermeasure to black hole attacks in mobile ad hoc networks. In Proceedings of Sensing and Control (ICNSC), an IEEE International Conference on Networking (pp. 508-513).","DOI":"10.1109\/ICNSC.2011.5874910"},{"key":"jtd.2012070106-19","doi-asserted-by":"crossref","unstructured":"Park, V. D., & Corson, M. S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies (pp. 1405-1413).","DOI":"10.1109\/INFCOM.1997.631180"},{"key":"jtd.2012070106-20","unstructured":"Pei, G., Gerla, M., & Hong, X. (2000). LANMAR: Landmark routing for large scale wireless ad hoc networks with group mobility. In Proceedings of the ACM MobiHoc (pp. 11\u201318)."},{"key":"jtd.2012070106-21","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., & Das. S. (2003). RFC3561 Ad hoc on-demand distance vector (AODV) routing, RFC Editor.","DOI":"10.17487\/rfc3561"},{"key":"jtd.2012070106-22","doi-asserted-by":"crossref","unstructured":"Perkins, C. E., & Royer, E. M. (1999). Ad hoc on-demand distance vector routing. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA \u201999).","DOI":"10.1109\/MCSA.1999.749281"},{"key":"jtd.2012070106-23","doi-asserted-by":"crossref","unstructured":"Saeed Alkatheiri, M., Jianwei, L., & Sangi, A. R. (2011). AODV routing protocol under several routing attacks in MANETs. In Proceedings of the 13th IEEE International Conference on Communication Technology (ICCT) (pp. 614-618).","DOI":"10.1109\/ICCT.2011.6157949"},{"key":"jtd.2012070106-24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.833153"},{"issue":"1","key":"jtd.2012070106-25","first-page":"338","article-title":"Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method.","volume":"5","author":"H. N.Satoshi Kurosawa","year":"2007","journal-title":"International Journal of Network Security"},{"key":"jtd.2012070106-26","doi-asserted-by":"crossref","unstructured":"Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In Proceedings of the Second International Conference on in Intelligent Systems, Modelling and Simulation (ISMS-2011) (pp. 338-343).","DOI":"10.1109\/ISMS.2011.58"},{"key":"jtd.2012070106-27","unstructured":"Songbai, L., Longxuan, L., Kwok-Yan, L., & Lingyan, J. (2009). SAODV: A MANET routing protocol that can withstand black hole attack. In Proceedings of the International Conference on Computational Intelligence and Security (CIS '09) (pp. 421-425)."},{"key":"jtd.2012070106-28","doi-asserted-by":"crossref","unstructured":"Tamilselvan, L., & Sankaranarayanan, V. (2007). Prevention of blackhole attack in MANET. In Proceeding of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007) (pp. 21-27).","DOI":"10.1109\/AUSWIRELESS.2007.61"},{"issue":"1","key":"jtd.2012070106-29","first-page":"13","article-title":"Prevention of co-operative black hole attack in MANET.","volume":"3","author":"L.Tamilselvan","year":"2008","journal-title":"Journal of Networks"},{"key":"jtd.2012070106-30","unstructured":"Wikipedia. (2012, May 13). Unix time. Retrieved from http:\/\/en.wikipedia.org\/wiki\/Unix_time"},{"key":"jtd.2012070106-31","unstructured":"XiaoYang. Z., Sekiya, Y., & Wakahara, Y. (2009). Proposal of a method to detect black hole attack in MANET. International Symposium on Autonomous Decentralized Systems (ISADS '09) (pp. 1-6)."},{"key":"jtd.2012070106-32","unstructured":"Zhao, M., & Zhou, J. (2009). Cooperative black hole attack prevention for mobile ad hoc networks. In Proceedings of the International Symposium on Information Engineering and Electronic Commerce (IEEC '09) (pp. 26-30)."}],"container-title":["International Journal of Technology Diffusion"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=79235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:47:59Z","timestamp":1654109279000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jtd.2012070106"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,7,1]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jtd.2012070106","relation":{},"ISSN":["1947-9301","1947-931X"],"issn-type":[{"value":"1947-9301","type":"print"},{"value":"1947-931X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,1]]}}}