Mitigating Scheme for Black Hole Attack in AODV Routing Protocol

Similar documents
Defending MANET against Blackhole Attackusing Modified AODV

Performance Analysis of Aodv Protocol under Black Hole Attack

CAODV Free Blackhole Attack in Ad Hoc Networks

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

A Review on Black Hole Attack in MANET

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

PERFORMANCE STUDY OF IMPROVED AODV AGIANST BLACK HOLE ATTACK IN WIRELESS ENVIRONMENT

Enhanced AODV for Providing QoS of Multimedia Application in MANET

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

2013, IJARCSSE All Rights Reserved Page 85

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

Keywords Ad hoc Network, AODV, Black hole attack, MANET, Security, Malicious Node

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Improving ZRP Protocol against Blackhole Attack

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Performance Evaluation of MANET through NS2 Simulation

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Routing Protocols in MANETs

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

IJMIE Volume 2, Issue 6 ISSN:

Power aware Multi-path Routing Protocol for MANETS

Routing Protocols in MANET: Comparative Study

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

Performance measurement of MANET routing protocols under Blackhole security attack

Figure 1: Ad-Hoc routing protocols.

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Performance Analysis and Enhancement of Routing Protocol in Manet

II. ROUTING CATEGORIES

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Blackhole detection and prevention in manet

Performance Evaluation of Various Routing Protocols in MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Evaluation of Routing Protocols for Mobile Ad hoc Networks

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Computation of Multiple Node Disjoint Paths

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Performance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2

A Survey - Energy Efficient Routing Protocols in MANET

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

International Journal of Advance Engineering and Research Development

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Gurleen Kaur Walia 1, Charanjit Singh 2

Impact of Hello Interval on Performance of AODV Protocol

AODV-PA: AODV with Path Accumulation

Recent Researches in Communications, Information Science and Education

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

3. Evaluation of Selected Tree and Mesh based Routing Protocols

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Improving AODV Protocol against Blackhole Attacks

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Packet Estimation with CBDS Approach to secure MANET

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery

Routing Protocols in Mobile Ad-Hoc Network

A Literature survey on Improving AODV protocol through cross layer design in MANET

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

K. R. Viswa Jhananie et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (6), 2015,

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Estimate the Routing Protocols for Internet of Things

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

An Adaptive Congestion Avoidance ACA_AODV Routing Protocol

The Performance Evaluation of AODV & DSR (On-Demand. emand- Driven) Routing Protocols using QualNet 5.0 Simulator

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March ISSN

Transcription:

Mitigating Scheme for Black Hole Attack in AODV Routing Protocol Ei Ei Khin, and Thandar Phyu Abstract A Mobile Ad hoc Network (MANET) is a collection of mobile nodes that can communicate with each other via wireless channels without depending on any infrastructure. The nodes depend on each other in a cooperative manner to keep the connected network. Due to dynamic network topology and mobility of nodes, there is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of these security threats and it announces the best and fresh path to the destination node. However, the source node actually send the data packet to the destination, the malicious node drops all received application packets intended for forwarding. In this paper, we propose an efficient and simple technique to detect and prevent black hole attack in Ad Ho On-Demand Distance Vector (AODV) routing protocol. The proposed system adds two new tables and new packet type to AODV protocol. The simulation results show that the proposed protocol has better security and performance in terms of packet delivery ratio than AODV protocol in the presence of Black holes. Keywords MANET, AODV, Black Hole Attack, RRT, NIT. A I. INTRODUCTION Mobile Ad-hoc Network (MANET) [2] is an autonomous wireless networking paradigm that enables the mobile nodes to communicate among each other without depending on any infrastructure. The mobile nodes may be PDA, laptop, mobile phone and so on. MANETs are flexible which the mobile device or node can easily join and leave to the network. The connectivity of mobile nodes via wireless channel is used hop by hop routing. So, the nodes may be router or host. As the flexibility of mobile nodes, MANET becomes open medium, self-organization, dynamic mobile nodes and topology, limited resources and lack of infrastructure network and defense mechanism. Due to its characteristics, MANETs are unprotected to various kinds of attacks. The security of routing protocol in Mobile Ad-Hoc Network is the most important concern for the basic functionality of network. MANETs have a lot of protocol such as OLSR (Optimized Link State Routing), AODV (Ad Hoc On-Demand Distance Vector), DSR (Dynamic Source Routing), ZRP (Zone Routing Protocol), DSDV (Destination Ei Ei Khin is with University of Technology (Yatanarpon Cyber City), Pyin Oo Lwin, Myanmar (+959440225200; eikhin1@gmail.com). Thandar Phyu is with Department of Advanced Science and Technology, Ministry of Science and Technology, Nay Pyi Taw, Myanmar (thandar.phyu@gmail.com). Sequence Distance Vector) protocol and so on. In this paper, we concentrate on the AODV routing protocol that is widely used in MANET. It gives dynamic link conditions, low network utilization, low control message overhead, low memory overhead, and so on. However, the protocol was not considered security mechanisms. Hence, it is defenseless various types of attacks. The black hole attack is one of these attacks against the AODV routing protocol. The malicious node send the counterfeit reply that it has the freshest and shortest path to the destination node. Then, it absorbs all data packets to the destination. Hence, it disturbs the network and becomes data lost and affects the performance of network. In this paper, we present a defense mechanism to identify and remove black hole attack and propose a feasible solution to find a safe route to the destination. The proposed method slightly modifies AODV protocol by adding two new tables and packet type. II. RELATED WORK There are various defense mechanisms in the literature that aim to protect the black hole attacks. Some of these research papers were reviewed in this section. The proposed architecture AODVR [9] has introduced several modules such as Threshold Tester, RREP sequence number Tester, Blacklist Tester, Extractor, Packet Classifier and ALARM broadcaster. In this method, the router calculates the range of the accepted sequence numbers and gives the threshold value. If any node exceeds the threshold values for several times, it is identified as black hole node. However, the calculation of the threshold value is a bit overwhelming, hence it results network delay. Although the calculation of correct threshold value prevent black hole node, the wrong calculation may disgrace an authentic node as a black hole. Latha Tamilselvan, V Sankaranarayanan [3] presented a feasible solution that modifies the AODV routing protocol, which avoids the multiple black holes nodes in the group. It uses the Fidelity table that every participating node in the network is assigned a fidelity level that gives the reliability of that node. In this case, if the level of node is 0 values, it is considered as a black hole node and is discarded from the network. However, this technique has the processing delay in the network. Watchara Saetang, Sakuna Charoenpanyasak [1] have introduced Credit based on Ad hoc On-demand Distance Vector (CAODV) routing protocol to detect and eliminate the http://dx.doi.org/10.15242/iie.e0314063 105

black hole attack. This approach deploy a credit mechanism to check the next hop whether it can be trusted or not. The credit is initiated in a route discovery phase by using a hop count multiplied by 3. At the beginning, a source node broadcasts RREQ to other nodes. The receiving node will assign a credit to the next hop node or who sent RREP. When a node in the path sends one packet, one credit is deducted from the next hop node. As soon as a destination node receives data packet, it will send Credit Acknowledge (CACK) back to a source node. A node within a way back will increase credit of the next hop by 2 to indicate a higher trust level of the next hop. On the other hand, credit will be decreased if a node cannot receive CACK. When a credit reaches to zero, the node will not be trusted and marked as a blacklist node. Herminder Singh et.al., [4] have discussed the AODV protocol suffering from black hole attack and proposed a feedback solution which comparatively decreases the amount of packet loss in the network. The black holes by examining the number of sent packets at that node which will always be equal to zero for most of the cases. After the malicious black nodes have been detected, we can adopt a feedback method to avoid the reacceptance of incoming packets at these black holes. The packets coming at the immediate previous nodes to black nodes are propagated back to the sender and the sender follows the alternative safer route to the destination node. However, it cannot detect black hole nodes when they worked as a group. Payal N. Raj, Prashant B. Swadas [5] proposed the mechanism that modifies the behavior of AODV protocol to check the sequence number of the received RREP. When the source node receives the RREP form the neighbors, it compares the received RREP s sequence number with the threshold value. If its sequence number is higher than the threshold value, this node is suspicious as a black hole. The threshold value is the average number of the difference between the destination sequence number in the RREP and the destination sequence number in the routing table within a certain periods of time. Their solution increases the routing overhead and the average end to end delay. K. Selvavinayaki et al. [6] have proposed the method based on Modified Ad-hoc On-demand Multipath Distance Vector Routing (MAOMDV) with secret sharing scheme. The authors uses shamir s secret sharing scheme to save the network bandwidth. The fundamental idea is distributing the secret in the network. When a source node wants to send a message to a destination, the source node determines a threshold secret sharing scheme to divide the message into multiple blocks and route them to the destination through the selected multiple paths. The destination upon receiving the certain number of correct shares recovers the original secure message. System process is divided into four section such as Secret Share Generation, Black hole node detection, prevention & removal, Share Allocation and Routing the message on optimal multiple path. This method can be inferred that one or more black hole nodes along the path can be identified. III. OVERVIEW OF AODV ROUTING PROTOCOL AODV is described in RFC 3561 [7]. It is the most widely adopted and well known reactive routing protocol for MANETs [10]. When a node wishes to start transmission with another node in the network which it has no route; AODV will provide topology information for the node. AODV use control messages to find a route to the destination node in the network. There are mainly three types of control messages in AODV such as Route Request Message (RREQ), Route Reply Message (RREP) and Route Error Message (RERR). A. Route Discovery Phase Whenever a node intends to send the packet to another node, it first checks its routing table. If a fresh route is available to the destination node, it uses that route to send the packet. If a route is not available or fresh enough route, then the node launches the route discovery process. So, it broadcasts Route Request message (RREQ) to its neighbors. The neighboring nodes first check whether it is the destination node or it has a fresh enough route to the destination node. If so, it sends back Route Reply message (RREP) to the source node. Otherwise, it forwards the RREQ message to its neighbors by using flooding approach. This process is continued until the node that has a fresh route to the destination is found or the destination node is found. When RREP reaches the source node, a route is established between the source node and the destination node. So, it can communicate with each other. B. Link Monitoring and Route Maintenance Phase Whenever there is a link failure or link broken down during the operation, the Route Error message (RERR) is sent to all other nodes that uses this link for their communication to other nodes. The Hello message is periodically sent for maintaining the route information [12]. Since AODV is a reactive routing protocol, a complete view of network topology is not given to the nodes. Hence, each node only knows its neighbors, and it only knows the next hop and the number of hops for non-neighbors. So, when a source node initiates a route discovery process, the black hole attack can easily enter the network by pretending it has fresh enough route. The AODV routing protocol cannot prevent the Black Hole attacks because malicious nodes may counterfeit a sequence number and hop count in the routing message. Then, it acquires the route and drops all the data packets as they pass. IV. BLACK HOLE ATTACK The black hole attack [8][11]occurs when a malicious node advertise itself for having the shortest path to the destination node or forging route reply message that is sent to the source node, with no effective route to the destination. This hostile node advertises its availability of fresh routes irrespective of checking its routing table. In this way attacker node will always have the availability in replying to the route request and thus intercept the data packet and retain it. In protocol based on flooding, the malicious node reply will be received http://dx.doi.org/10.15242/iie.e0314063 106

by the requesting node before the reception of reply from actual node; hence a malicious and forged route is created. When this route is establish, the malicious node does not relay the packet and absorbs all data packet. As an example, consider the following scenario in Fig. 1. In this scenario, the node S is the source node, D is the destination node and M is assumed the malicious node. When the source node S want to send the data packet to the destination node D, it first broadcasts the RREQ message with destination sequence number 4 to the neighboring nodes. So, the neighboring node C, E and the malicious node M receive this message. As the node M is a malicious node, it immediately sends back a RREP message to node S with highest sequence number that it has a active route to the destination. The node S assumes that this is the freshest route. So, the node S ignores all other replies and sends the data packets to the destination through it. However, the node M absorbs all the data and thus behaves like a Black hole. Fig. 1 Black hole attack V. THE PROPOSED SOLUTION In this section, the approach has been proposed to prevent black hole attack in AODV routing protocol. The proposed system tries to modify the process of source node by introducing two new tables and alarm packet into existing AODV protocol. These tables are RREP Record Table (RRT) and Node Information Table (NIT). RRT table stores all RREP record from neighbor s node and NIT table stores the malicious node. When the black hole node is detected, the source node is automatically sending out the Alarm message to all nodes in the network by broadcasting. In the original AODV protocol, by default, the source node accepts the first fresh enough RREP message coming to it and ignores all other RREP. Generally, malicious node with high destination sequence number sends the route reply first during black hole attacks. As compared, in our approach, we keep all the RREP in RRT until the predefined wait time. We compute the value of difference between the destination sequence number in RRT and the destination sequence number in RT and compare how much differences of reply sequence number of each neighboring node. If the value of the difference between them is high enough, this node is assumed the malicious node and the algorithm immediately removes that entry from the RRT. Then, this malicious node ID is stored in NIT and send alarm message to all neighbors. We choose the reliable node from the resting packets. After choosing the reliable node, all entries of RRT table is deleted. Moreover, if there is not much difference between them, we choose the node that has the second the largest difference value of sequence number as the reliable node. Because the first reply may be from the malicious node. A. Algorithm for Preventing Black Hole Attack SN - Source Node IN - Intermediate Node MN - Malicious Node RT - Routing Table in AODV DSN - Destination Sequence Number RREQ Route Request Packet RREP Route Reply Packet NID - Node ID BEGIN Step1: SN broadcasts RREQ to neighbors. Step2: Store the RREP into RRT until the wait time. Step3: Calculate and compare the difference between the DSNs in RRT and DSN in RT. IF the value of the difference between them is high enough, then IN is assumed MN Store IN to NIT. Discard that entry from RRT Send alarm message to all neighbors. Choose the reliable node from the resting nodes. Else there is not much difference between them, then Choose the node that has the second largest difference value of the DSNs as the reliable node. Step4: Flush the RRT after choosing the reliable node and continue the normal operation of AODV protocol. END VI. SIMULATION ENVIRONMENT We have implemented the black hole attack in AODV protocol using NS-2.34 [13]. For our simulation, we use the IEEE 802.11 Mac at the physical and data link layer. The channel is Wireless Channel based on Two Ray Ground radio propagation model. AODV is used at the network layer as the routing protocol. Finally, UDP is used at the transport layer. The overall simulation parameters are presented in Table 1. We have evaluated the performance of the AODV protocol and the proposed AODV protocol with the black hole attack. The following performance metrics are used to analyze the performance of our solution. http://dx.doi.org/10.15242/iie.e0314063 107

A. Packet Delivery Ratio It is the ratio between the number of CBR packets sent by the source and the number of packets received by the destination. B. Average End-to-End Delay It is the average delay between the sending of the data packet by the source and the receiving it by the destination. It is measured in milliseconds. TABLE I SIMULATION PARAMETERS Parameter Value Simulator NS-2.34 Area 800m x 800m Routing Protocol AODV Simulation time 200s Application Traffic CBR Number of Nodes 50 Malicious Node 1,2,3,4,5 Pause time 4-40 s Packet Size 512 bytes Transmission rate 2 packets/s Maximum speed 10-70 m/s No of Connections 20 Movement Model Random Waypoint C. Effect of Number of Malicious Node on Performance We evaluated the performance of AODV under attack and proposed AODV under attack in the context of variation in malicious nodes as shown in Fig. 2. It can be seen that PDR of AODV dramatically decreases when the number of malicious nodes is increased. The PDR of proposed AODV protocol is above 95%. D. Effect of Mobility on Performance The performance of AODV, AODV under attack and proposed AODV under attack in the context of variation in mobility are evaluated as shown in Fig. 3 and Fig. 4. It is observed that AODV performs better for lower node mobility rate. The PDR starts decreasing when the mobility of nodes is increasing. In Fig. 3, AODV results in very low PDR under attack while proposed AODV exhibits the good results. The PDR of proposed AODV is almost same as the PDR of normal AODV. The end to end delay is shown in Fig. 4. The delay of proposed AODV is higher than the normal AODV protocol due to the additional waiting time for route replies. There is decrease in the delay in the presence of black hole as the immediate reply of malicious node without checking its routing table. Fig. 2 Packet delivery ratio & number of malicious nodes Fig. 3 Packet delivery ratio & node mobility Fig. 4 Average end-to-end delay and node mobility E. Effect of Pause Time on Performance We simulated the performance of AODV, AODV under attack and proposed AODV under attack in the circumstance of variation in pause time. The results are shown in Fig. 5 and 6. The PDR of normal AODV and proposed AODV is not http://dx.doi.org/10.15242/iie.e0314063 108

much difference. At the same time, Fig. 6 shows that the rise in end-to-end delay of proposed AODV. Fig. 5 Packet delivery ratio & pause time Fig. 6 Average end-to-end delay and pause time VII. CONCLUSION AND FUTURE WORK In this paper, a simple approach for preventing the Black Hole attack in AODV is proposed. The proposed algorithm can be applied to identify and remove the black hole node and to gain the secured route from source to destination in the MANET. The comparison of proposed AODV and AODV is done using NS-2. The performance metrics such as packet delivery ratio, average end to end delay has been evaluated and analyzed with the variable node mobility, pause time and number of malicious nodes. The proposed solution is effective against black holes attack and it has higher packet delivery ratio. But, the end to end delay of proposed system is gradually increased than the normal AODV protocol. As future work, we intend to analyze the performance of the proposed solution based on the various security parameters and to prevent the cooperative black hole attack in the network. my thanks to my Institution namely University of Technology (Yatanarpon Cyber City) for providing me with a good environment and facilities like Internet, books, computers and all that as my source to complete this research work. My heartfelt thanks to my family, friends and colleagues who have helped me for the completion of this work. REFERENCES [1] Watchara Saetang, Sakuna Charoenpanyasak, CAODV free black hole attack in ad hoc networks, International Conference on Computer Networks and Communication Systems (CNCS 2012), IPCSIT vol.35, IACSIT Press, Singapore, 2012. [2] Charles E. Perkins, Ad Hoc Networking, Addison-Wesley, Pearson edu., Jan. 2001. [3] Latha Tamilselvan, V. Sankaranarayanan, Prevention of co-operative black hole attack in MANET, Journal of Networks, vol. 3, no. 5, pp. 13-20, May 2008. [4] Herminder Singh, Shweta, An approach for detection and removal of black hole In MANETS, International Journal of Research in IT& Management (IJRIM), vol. 1, issue 2, June 2011. [5] Payal N. Raj1 and Prashant B. Swadas2, DPRAODV: a dynamic learning system against black hole attack in aodv based MANET, International Journal of Computer Science Issues, vol. 2, issue 3, 2009, pp. 54-59. [6] K. Selvavinayaki, E. Karthikeyan, A reliable data transmission approach to prevent black hole attack in MANET, International Journal of Computer Science and Telecommunications, vol. 3, issue 3, March 2012. [7] C. Perkins, E. Belding-Royer, and S. Das, Ad-hoc on demand distance vector (AODV) routing, IETF RFC 3561, July 2003. [8] Hongmei Deng, Wei Li, and Dharma P. Agarwal, Routing security in wireless ad hoc networks, University of Cincinnati, IEEE Communications magazine, vol.40, no.10, October 2002. [9] Mohammad Abu Obaida, Shahnewaz Ahmed Faisal, Md. Abu Horaira, Tanay Kumar Roy, AODV robust (AODVR): an analytic approach to shield ad-hoc networks from black holes, International Journal of Advanced Computer Sciences and Applications, vol. 2, issue 8, pp. 97-102, 2011. [10] Ochola EO, Eloff MM, A review of black hole attack on aodv routing in MANET, [Online]. Available: http://icsa.cs.up.ac.za/issa/2011/proceedings/research/ochola_eloff.pd f [11] Gaurav Sandhu, Moitreyee Dasgupta, Impact of black hole attack in MANET, International J. of Recent Trends in Engineering and Technology, vol. 3, no. 2, May 2010. [12] Akanksha Nigam*, A study of ad hoc on demand distance vector routing protocol, International Journal of Research in IT& Management (IJRIM), vol.1, issue 2, June 2011. [13] Kevin Fall, Kannan Varadhan, The ns manual, [Online]. Available: http://www.isi.edu/nsnam/ns/doc/index.html Ei Ei Khin has completed Master of Computer Technology (M.C.Tech) from University of Computer Studies (Mandalay). Currently, she is a PhD candidate from University of Technology (Yatanarpon Cyber City). She is working as a tutor in Computer University (Magway) and her research areas are wireless network, mobile ad-hoc network and network security. ACKNOWLEDGMENT My Sincere thanks to my supervisor Dr. Thandar Phyu, for providing me an opportunity to do my research work. I express http://dx.doi.org/10.15242/iie.e0314063 109