In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
Ninth International Network Conference (INC 2012)
Title: Mobile Ad-hoc Network Security Challenges Under AODV Routing Protocol
Author(s): Elisha Oketch Ochola, Mariki M Eloff, John Andre van der Poll
Keywords: Mobile Ad-hoc Network (MANET), AODV Routing Protocol, Black Hole Attack
Abstract: Mobile Ad-hoc Network (MANET) is a group of heterogeneous mobile nodes, forming a temporary network which is infrastructure less, multi-hop and dynamic in nature. MANET requires that nodes cooperate to be able to communicate. The nodes, which act as hosts as well as routers, communicate with each other through multiple hops due to limited transmission ranges. Security challenges in MANETs such as channel vulnerability, absence of infrastructure, node vulnerability, dynamic topology, cooperative routing protocols and limited resources, pose new kinds of security threats to such networks. Unlike other types of networks, MANETs are deployed without a centralised control unit. Therefore, the direct application of the conventional routing algorithms may not be feasible. Mutual cooperation amongst the participating entities forms the basis for determining the routes to the destination. This aspect makes MANETs vulnerable to various communication security related attacks. Black Hole attacks are launched by participating malicious nodes that agree to forward data packets to a destination but eavesdrop or drop the packets intentionally, which not only compromise the network, but also degrade network performance. Routing protocols, which act as the binding force in these networks, are a common target of malicious nodes. This paper analyses challenges with existing solutions to Black Hole attack in MANET and concludes that, better secure approaches can be achieved through utilisation of optimised threshold values during anomaly detections in routing control packets' characteristic changes.
Download count: 1230
How to get this paper:
PDF copy of this paper is free to download. You may distribute this copy providing you cite this page as the source.