Effect of Network Attacks On AODV Routing Protocol- A Review

Vaibhav Suhane, Mahesh Gour, Sadhna K. Mishra

Abstract


Ad hoc network is a temporary network. This has no fixed topology and infrastructure. MANETs, SANET and VANET are the types of Adhoc network. These day MANETs are gaining most popularity and everywhere MANETs is used because it has many advantages as well as some problems available. In MANET many types of attack by malicious nodes and that nodes dispute the performance of the network. Black hole attack, wormhole attack and Dos attack etc are the example of network attacks in MANET. AODV is a reactive routing protocol. In this protocol malicious nodes can easily introduce and easily dispute the performance of the network. So a new protocol can be develop .this protocol defects all types of network attacks and prevent the network form the attacks and give the better performance compare the other protocol.

Keywords


MANET, ATTACKS, AODV

References


M. Frodigh, P. Johansson, and P. Larsson.“Wireless ad hoc networking: the art of networking without a network”, Ericsson Review, No.4, 2000, pp. 248-263.

N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims," in Proceedings of the 2nd ACM workshop on Wireless security. San Diego, CA, SA:ACM, 2003, 941313 1-10.

L. Qian, N. Song, and X. Li, “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach," J. Netw. Comput.Appl.,vol. 30, no. 1, pp. 308-330, 2007.

S. Kumar, V. S. Raghavan, and J. Deng, “Medium access control protocols for ad-hoc wireless networks: a survey." Ad-Hoc Networks, vol. 4, no. 3, pp. 326{358, May 2006.

K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “A secure routing protocol for ad hoc networks," in Proceedings of the 10th IEEE International Conference on Network Protocols. IEEE Computer Society, 2002, 656326 78-89.

Y.-C. Hu, A. Perrig, and D. B. Johnson, “Rushing attacks and defense in wireless ad hoc network routing protocols," in WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security. New York, NY, USA: ACM, 2003, pp. 30-40.

M. Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing protocols for mobile ad hoc networks," Ad Hoc Networks, vol. 2, no. 1, pp. 1-22, 2004.

B. Wu, J. Chen, J. Wu, and M. Cardei, Network Theory and Applications.Springer, 2007, vol. 17, ch.A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks.

S. Capkun, L. Buttya'n, and J.-P.Hubaux, “Sector: secure tracking of node encounters in multi-hop wireless networks," in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. Fairfax, Virginia: ACM, 2003, 986862 21-32.

I. Khalil, S. Bagchi, and N. B. Shro_, “Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Comput. Netw., vol. 51, no. 13, pp.3750-3772, 2007, 1276793


Full Text: PDF

Refbacks

  • There are currently no refbacks.




 


All Rights Reserved © 2012 IJARCSEE


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.