Abstract
From last two decades, mobile ad-hoc network has significantly contributed to the research. Mobile ad-hoc network basically filed of wireless ad-hoc network in which all the connected components shares their data and make communication with each other without any dedicated links/path or without wired communication. There are various protocols available for the secured communication and safely transfer the files and data. However, the attacker will always be in action to destroy the communication or link between the sender and receiver. In the following paper, we present the survey on various types of attack in the field of wireless ad-hoc network including internal and external attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
D. Nitnaware, A. Thakur, Black hole attack detection and prevention strategy in DYMO for MANET. in IEEE 3rd International Conference on Signal Processing and Integrated Networks, pp. 279–284 (2016)
E. Zola, I.M. Escalona, DYMO self-forwarding: a simple way for reducing the routing overhead in MANETs. Hindawi Mob. Inf. Syst. 2017, 10–17 (2017)
R. Dutta, R. Thalore, Performance comparison of AODV and DYMO routing protocols, for congestion detection in VANET, in International Journal of Advance Research Ideas and Innovations in Technology, pp. 447–454 (2017)
J. Kaur, R. Kaur, Performance analysis of AODV and DYMO routing protocols in MANETs using cuckoo search optimization. International Journal of Advance Research in Computer Science and Management Studies 2, 236–247 (2014)
A.K. Gupta, H. Sadawarti, Performance enhancement of DYMO routing protocol with ant colony optimization. Int. J. Electron. Electr. Eng. 2, 188–193 (2014)
S.K. Deb, P.K. Banerjee, Modified dynamic MANET on-demand (DYMO) routing protocol, in International Journal of Emerging Trends & Technology in Computer Science, pp. 139–144 (2014)
A. Pandey, R. Thalore, Performance comparison of AODV and DYMO routing protocols for boundary detection in 3-D wireless sensor networks, in International Journal of Advance Research, Ideas and Innovations in Technology, pp. 429–436 (2017)
N. Arya, U. Singh, S. Singh, Detecting and avoiding of worm hole attack and collaborative black hole attack on MANET using trusted AODV routing algorithm, in IEEE International Conference on Computer, Communication and Control, pp. 1–6 (2015)
A.K. Yadav, A. Kush, Assessment of routing protocols in MANET. IJCSC 07, 252–257 (2016)
D. Nayak, Y.C. Kiran, Malicious node detection by identification of gray and black hole attacks using control packets in MANETs. Imperial J. Interdiscip. Res. 3, 494–498 (2017)
P. Pongle, G. Chavan, Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 121, 786–797 (2016)
V.S. Venu, D. Avula, Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks. Int. J. Commun. Syst. 31, 1–19 (2018)
G. Arulkumaran, R.K. Gnanamurthy, Fuzzy trust approach for detecting black hole attack in mobile ad-hoc network. Mob. Netw. Appl. 2017, 1–8 (2017)
K.S. Arathy, C.N. Sminesh, A novel approach for detection of single and collaborative black hole attacks in MANET. Proc. Technol. 25, 264–271 (2016)
S. Gurung, S. Chauhan, A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET. Wireless Netw. 25, 1–11 (2017)
S. Gurung, S. Chauhan, A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Netw. 24, 2957–2971 (2018)
C. Panos, C. Xenakis, Analysing, quantifying, and detecting the black hole attack in infrastructure-less networks. Comput. Netw. 113, 94–110 (2017)
A. Dorri, An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. Wireless Netw. 23, 1767–1778
S. Dhende, A. Najan, SAODV: black hole and gray hole attack detection protocol in MANETs. (WiSPNET), in Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 22–24 March, pp. 2391–2394 (2017)
S. Shahabi, M. Bakhtiarian, A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Netw. 22, 1505–1511 (2016)
M.B.M. Kamel, A.N. Onaizah, STAODV: a secure and trust based approach to mitigate black hole attack on AODV based MANET, in IEEE in Proceedings of the IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 25–26 March, pp. 1278–1282 (2017)
A. Dhakaa, R.S. Dhaka, Gray and black hole attack identification using control packets in MANETs. Proc. Comput. Sci. 54, 83–91 (2015)
N. Sharma, A.S. Bisen, Detection as well as removal of black hole and gray hole attack in MANET, in Proceedings of the 2016 International Conference on Electrical Electronics and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March, pp. 3736–3739 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Chaurasia, N., Dimri, P., Gupta, K.K. (2020). Black-Hole and Wormhole Attack Using DYMO and AODV Protocol: A Review. In: Nanda, A., Chaurasia, N. (eds) High Performance Vision Intelligence. Studies in Computational Intelligence, vol 913. Springer, Singapore. https://doi.org/10.1007/978-981-15-6844-2_4
Download citation
DOI: https://doi.org/10.1007/978-981-15-6844-2_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-6843-5
Online ISBN: 978-981-15-6844-2
eBook Packages: EngineeringEngineering (R0)