Abstract
Mobile Adhoc Networks has become an important and exciting technology in recent years in which security has become an important issue. Black hole Attack is one of the possible and severe security attacks in mobile ad hoc networks which block the communication of secret data. Black hole attack directly attacks the node’s data traffic on the path and intentionally drops, alters or delays the data traffic passing through that node. In another type of black hole attack which falsely replies for the route request which comes from the source that it has enough routes to the destination even it does not have path to the destination. This paper deals with prevention of both types of black hole attacks and secure data communication using secret sharing and Random Multipath Routing Techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Himral, L., Vig, V.: Preventing AODV Routing Protocol from Black Hole Attack. International Journal of Engineering Science and Technology 3(5), 3927–3932 (2011)
Claveirole, T., de Amorim, M.D., Abdalla, M., Viniotis, Y.: Securing wireless sensor networks against aggregator compromises. IEEE Communications Magazine, 134–141 (April 2008)
Raj, P.N., Swadas, P.B.: DPRAODV: A dynamic learning system against black hole attack in AODV based MANET. International Journal of Computer Science Issues (IJCSI) 2(3), 54–59 (2009)
Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: International Conference, ICWN 2003, Las Vegas, Nevada, USA, pp. 570–575 (2003)
Yoon, S.-M., Park, S., Al-Shurman, M.: Black Hole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, ACM South East Regional Conference, pp. 96–97 (2004)
Yu, C.W., Wu, T.-K., Cheng, R.-H., Chang, S.C.: A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., **e, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 538–549. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kamatchi, V., Mukesh, R., Rajakumar (2013). Securing Data from Black Hole Attack Using AODV Routing for Mobile Ad Hoc Networks. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31552-7_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-31552-7_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31551-0
Online ISBN: 978-3-642-31552-7
eBook Packages: EngineeringEngineering (R0)