Securing AODV routing protocol against the black hole attack using Firefly algorithm

نویسندگان

  • Ebrahimi, M. Department of Computer Engineering, Germi branch, Islamic Azad University, Germi,
  • Jamali , Sh. Department of Computer Engineering, University ofMohaghegh ardabili, Ardabil
چکیده مقاله:

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate nodes are used. Despite having many benefits due to wireless channel and dependency of each node to the intermediate node, these networks are faced with many security concerns. One of the concerns is the possibility of black hole attacks occurrence. The occurrence of black hole attacks has challenged the security issue in this kind of networks. This type of attack which is applied on mobile ad hoc network routing protocols, declares its black hole node as the shortest route to the destination node and therefore, other nodes in the network select this node as the intermediate node in sending their packets to various destinations. As a result, these nodes can delete received packets instead of sending them to destination. To avoid this problem in mobile ad hoc networks and based on AODV routing protocol, we introduce a new method to immediately identify the black hole attack and prevent it from occurring. To detect and defend against black hole attacks in mobile ad hoc networks, we use Firefly algorithms. Firefly algorithm is a biologically motivated algorithm for multi-faceted optimizing applications which is recently developed and used in many applications. To demonstrate the effectiveness of FireFlyAODV method, we used NS-2 Simulator and compared our work with AODV protocol under black hole attack. The results of simulation show that the proposed method has higher performance in terms of packet delivery ratio, throughput, the number of removed packets and end-to-end delay

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing AODV Routing Protocol Against the Black Hole Attack Using Firefly Algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Securing MANETs Routing Protocol under Black Hole Attack

Wireless or mobile network is the new generation of wireless network that is different from the wired approach in many aspects like power and energy efficient routing protocols, routing configuration, network infrastructure. There are several protocols proposed for the deployment of MANETs in fields like government, military etc. In this paper we are proposing a technique to identify attack i.e...

متن کامل

A Simulation Model to Secure the Routing Protocol AODV against Black-Hole Attack in MANET

An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. In mobile ad hoc network, each mobile node acts as a host as well as a router. These nodes communicate to each other by hop-to-hop communication. A number of routing protocols like Ad Hoc On-Demand Distance Vecto...

متن کامل

A Survey on Security Solutions of AODV Routing Protocol against Black Hole Attack in MANET

Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing features AODV has gained popularity compared to other routing protocols, but this protocol lacks a security features which make it more vulnerable to malicious attack particularly black hole attack. A single or cooperate black hole attacks wh...

متن کامل

Black Hole Detection in MANET Using AODV Routing Protocol

Mobile Ad-hoc network (MANET) has become an individual part for communication for mobile device. Therefore, interest in research of Mobile Ad-hoc network has been growing since last few years. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared ...

متن کامل

Securing AODV Protocol against BlackholeAttacks

Mobile Ad Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network.The nodes can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self-configuration ability, they can be deployed urgently withou...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 6  شماره None

صفحات  53- 64

تاریخ انتشار 2016-11

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

کلمات کلیدی برای این مقاله ارائه نشده است

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023