Securing AODV routing protocol against the black hole attack using Firefly algorithm
نویسندگان
چکیده مقاله:
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate nodes are used. Despite having many benefits due to wireless channel and dependency of each node to the intermediate node, these networks are faced with many security concerns. One of the concerns is the possibility of black hole attacks occurrence. The occurrence of black hole attacks has challenged the security issue in this kind of networks. This type of attack which is applied on mobile ad hoc network routing protocols, declares its black hole node as the shortest route to the destination node and therefore, other nodes in the network select this node as the intermediate node in sending their packets to various destinations. As a result, these nodes can delete received packets instead of sending them to destination. To avoid this problem in mobile ad hoc networks and based on AODV routing protocol, we introduce a new method to immediately identify the black hole attack and prevent it from occurring. To detect and defend against black hole attacks in mobile ad hoc networks, we use Firefly algorithms. Firefly algorithm is a biologically motivated algorithm for multi-faceted optimizing applications which is recently developed and used in many applications. To demonstrate the effectiveness of FireFlyAODV method, we used NS-2 Simulator and compared our work with AODV protocol under black hole attack. The results of simulation show that the proposed method has higher performance in terms of packet delivery ratio, throughput, the number of removed packets and end-to-end delay
منابع مشابه
Securing AODV Routing Protocol Against the Black Hole Attack Using Firefly Algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملSecuring MANETs Routing Protocol under Black Hole Attack
Wireless or mobile network is the new generation of wireless network that is different from the wired approach in many aspects like power and energy efficient routing protocols, routing configuration, network infrastructure. There are several protocols proposed for the deployment of MANETs in fields like government, military etc. In this paper we are proposing a technique to identify attack i.e...
متن کاملA Simulation Model to Secure the Routing Protocol AODV against Black-Hole Attack in MANET
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. In mobile ad hoc network, each mobile node acts as a host as well as a router. These nodes communicate to each other by hop-to-hop communication. A number of routing protocols like Ad Hoc On-Demand Distance Vecto...
متن کاملA Survey on Security Solutions of AODV Routing Protocol against Black Hole Attack in MANET
Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing features AODV has gained popularity compared to other routing protocols, but this protocol lacks a security features which make it more vulnerable to malicious attack particularly black hole attack. A single or cooperate black hole attacks wh...
متن کاملBlack Hole Detection in MANET Using AODV Routing Protocol
Mobile Ad-hoc network (MANET) has become an individual part for communication for mobile device. Therefore, interest in research of Mobile Ad-hoc network has been growing since last few years. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared ...
متن کاملSecuring AODV Protocol against BlackholeAttacks
Mobile Ad Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network.The nodes can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self-configuration ability, they can be deployed urgently withou...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 6 شماره None
صفحات 53- 64
تاریخ انتشار 2016-11
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
کلمات کلیدی برای این مقاله ارائه نشده است
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023