Black-Hole and Wormhole Attack Using DYMO and AODV Protocol: A Review

  • Chapter
  • First Online:
High Performance Vision Intelligence

Part of the book series: Studies in Computational Intelligence ((SCI,volume 913))

  • 319 Accesses

Abstract

From last two decades, mobile ad-hoc network has significantly contributed to the research. Mobile ad-hoc network basically filed of wireless ad-hoc network in which all the connected components shares their data and make communication with each other without any dedicated links/path or without wired communication. There are various protocols available for the secured communication and safely transfer the files and data. However, the attacker will always be in action to destroy the communication or link between the sender and receiver. In the following paper, we present the survey on various types of attack in the field of wireless ad-hoc network including internal and external attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. D. Nitnaware, A. Thakur, Black hole attack detection and prevention strategy in DYMO for MANET. in IEEE 3rd International Conference on Signal Processing and Integrated Networks, pp. 279–284 (2016)

    Google Scholar 

  2. E. Zola, I.M. Escalona, DYMO self-forwarding: a simple way for reducing the routing overhead in MANETs. Hindawi Mob. Inf. Syst. 2017, 10–17 (2017)

    Google Scholar 

  3. R. Dutta, R. Thalore, Performance comparison of AODV and DYMO routing protocols, for congestion detection in VANET, in International Journal of Advance Research Ideas and Innovations in Technology, pp. 447–454 (2017)

    Google Scholar 

  4. J. Kaur, R. Kaur, Performance analysis of AODV and DYMO routing protocols in MANETs using cuckoo search optimization. International Journal of Advance Research in Computer Science and Management Studies 2, 236–247 (2014)

    Google Scholar 

  5. A.K. Gupta, H. Sadawarti, Performance enhancement of DYMO routing protocol with ant colony optimization. Int. J. Electron. Electr. Eng. 2, 188–193 (2014)

    Article  Google Scholar 

  6. S.K. Deb, P.K. Banerjee, Modified dynamic MANET on-demand (DYMO) routing protocol, in International Journal of Emerging Trends & Technology in Computer Science, pp. 139–144 (2014)

    Google Scholar 

  7. A. Pandey, R. Thalore, Performance comparison of AODV and DYMO routing protocols for boundary detection in 3-D wireless sensor networks, in International Journal of Advance Research, Ideas and Innovations in Technology, pp. 429–436 (2017)

    Google Scholar 

  8. N. Arya, U. Singh, S. Singh, Detecting and avoiding of worm hole attack and collaborative black hole attack on MANET using trusted AODV routing algorithm, in IEEE International Conference on Computer, Communication and Control, pp. 1–6 (2015)

    Google Scholar 

  9. A.K. Yadav, A. Kush, Assessment of routing protocols in MANET. IJCSC 07, 252–257 (2016)

    Google Scholar 

  10. D. Nayak, Y.C. Kiran, Malicious node detection by identification of gray and black hole attacks using control packets in MANETs. Imperial J. Interdiscip. Res. 3, 494–498 (2017)

    Google Scholar 

  11. P. Pongle, G. Chavan, Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 121, 786–797 (2016)

    Google Scholar 

  12. V.S. Venu, D. Avula, Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks. Int. J. Commun. Syst. 31, 1–19 (2018)

    Google Scholar 

  13. G. Arulkumaran, R.K. Gnanamurthy, Fuzzy trust approach for detecting black hole attack in mobile ad-hoc network. Mob. Netw. Appl. 2017, 1–8 (2017)

    Google Scholar 

  14. K.S. Arathy, C.N. Sminesh, A novel approach for detection of single and collaborative black hole attacks in MANET. Proc. Technol. 25, 264–271 (2016)

    Google Scholar 

  15. S. Gurung, S. Chauhan, A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET. Wireless Netw. 25, 1–11 (2017)

    Google Scholar 

  16. S. Gurung, S. Chauhan, A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Netw. 24, 2957–2971 (2018)

    Google Scholar 

  17. C. Panos, C. Xenakis, Analysing, quantifying, and detecting the black hole attack in infrastructure-less networks. Comput. Netw. 113, 94–110 (2017)

    Google Scholar 

  18. A. Dorri, An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. Wireless Netw. 23, 1767–1778

    Google Scholar 

  19. S. Dhende, A. Najan, SAODV: black hole and gray hole attack detection protocol in MANETs. (WiSPNET), in Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 22–24 March, pp. 2391–2394 (2017)

    Google Scholar 

  20. S. Shahabi, M. Bakhtiarian, A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Netw. 22, 1505–1511 (2016)

    Google Scholar 

  21. M.B.M. Kamel, A.N. Onaizah, STAODV: a secure and trust based approach to mitigate black hole attack on AODV based MANET, in IEEE in Proceedings of the IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 25–26 March, pp. 1278–1282 (2017)

    Google Scholar 

  22. A. Dhakaa, R.S. Dhaka, Gray and black hole attack identification using control packets in MANETs. Proc. Comput. Sci. 54, 83–91 (2015)

    Google Scholar 

  23. N. Sharma, A.S. Bisen, Detection as well as removal of black hole and gray hole attack in MANET, in Proceedings of the 2016 International Conference on Electrical Electronics and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March, pp. 3736–3739 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Chaurasia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chaurasia, N., Dimri, P., Gupta, K.K. (2020). Black-Hole and Wormhole Attack Using DYMO and AODV Protocol: A Review. In: Nanda, A., Chaurasia, N. (eds) High Performance Vision Intelligence. Studies in Computational Intelligence, vol 913. Springer, Singapore. https://doi.org/10.1007/978-981-15-6844-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-6844-2_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-6843-5

  • Online ISBN: 978-981-15-6844-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation