Securing AODV routing protocol against the black hole attack using Firefly algorithm

Authors

  • Ebrahimi, M. Department of Computer Engineering, Germi branch, Islamic Azad University, Germi,
  • Jamali , Sh. Department of Computer Engineering, University ofMohaghegh ardabili, Ardabil
Abstract:

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate nodes are used. Despite having many benefits due to wireless channel and dependency of each node to the intermediate node, these networks are faced with many security concerns. One of the concerns is the possibility of black hole attacks occurrence. The occurrence of black hole attacks has challenged the security issue in this kind of networks. This type of attack which is applied on mobile ad hoc network routing protocols, declares its black hole node as the shortest route to the destination node and therefore, other nodes in the network select this node as the intermediate node in sending their packets to various destinations. As a result, these nodes can delete received packets instead of sending them to destination. To avoid this problem in mobile ad hoc networks and based on AODV routing protocol, we introduce a new method to immediately identify the black hole attack and prevent it from occurring. To detect and defend against black hole attacks in mobile ad hoc networks, we use Firefly algorithms. Firefly algorithm is a biologically motivated algorithm for multi-faceted optimizing applications which is recently developed and used in many applications. To demonstrate the effectiveness of FireFlyAODV method, we used NS-2 Simulator and compared our work with AODV protocol under black hole attack. The results of simulation show that the proposed method has higher performance in terms of packet delivery ratio, throughput, the number of removed packets and end-to-end delay

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Securing AODV Routing Protocol Against the Black Hole Attack Using Firefly Algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

full text

Securing MANETs Routing Protocol under Black Hole Attack

Wireless or mobile network is the new generation of wireless network that is different from the wired approach in many aspects like power and energy efficient routing protocols, routing configuration, network infrastructure. There are several protocols proposed for the deployment of MANETs in fields like government, military etc. In this paper we are proposing a technique to identify attack i.e...

full text

A Simulation Model to Secure the Routing Protocol AODV against Black-Hole Attack in MANET

An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. In mobile ad hoc network, each mobile node acts as a host as well as a router. These nodes communicate to each other by hop-to-hop communication. A number of routing protocols like Ad Hoc On-Demand Distance Vecto...

full text

A Survey on Security Solutions of AODV Routing Protocol against Black Hole Attack in MANET

Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing features AODV has gained popularity compared to other routing protocols, but this protocol lacks a security features which make it more vulnerable to malicious attack particularly black hole attack. A single or cooperate black hole attacks wh...

full text

Black Hole Detection in MANET Using AODV Routing Protocol

Mobile Ad-hoc network (MANET) has become an individual part for communication for mobile device. Therefore, interest in research of Mobile Ad-hoc network has been growing since last few years. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared ...

full text

Securing AODV Protocol against BlackholeAttacks

Mobile Ad Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network.The nodes can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self-configuration ability, they can be deployed urgently withou...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 6  issue None

pages  53- 64

publication date 2016-11

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

No Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023