The Development of Blackhole Attack in AODV Routing Protocol

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless network plays big role in order of a lot research to be accessible to other facilities for multiple aim in communication. It's the case in AODV (Ad Hoc On-demand Distance Vector Routing) provides many new approaches. There are a lot of attacks on MANETs, one of them is Blackhole. A lot of approach was studied to overcome this drawback of the protocol. The malicious node attempt to rob neighbor's data by its behavior to imitate the other node and lie about the information of their neighbor to the network, also disturbing the activities. Here we focus on the BPAODV approach facing the blackhole. This paper is studied because of the desire to implement the BPAODV in MANET. From the result, if there is a blackhole, the number of packets received will be far less than the number of packets sent and the performance of whole network is fall.

Original languageEnglish
Title of host publicationCENIM 2020 - Proceeding
Subtitle of host publicationInternational Conference on Computer Engineering, Network, and Intelligent Multimedia 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages309-314
Number of pages6
ISBN (Electronic)9781728182834
DOIs
Publication statusPublished - 17 Nov 2020
Event2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia, CENIM 2020 - Virtual, Surabaya, Indonesia
Duration: 17 Nov 202018 Nov 2020

Publication series

NameCENIM 2020 - Proceeding: International Conference on Computer Engineering, Network, and Intelligent Multimedia 2020

Conference

Conference2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia, CENIM 2020
Country/TerritoryIndonesia
CityVirtual, Surabaya
Period17/11/2018/11/20

Keywords

  • AODV
  • Blackhole
  • MANET
  • Network
  • Wireless

Fingerprint

Dive into the research topics of 'The Development of Blackhole Attack in AODV Routing Protocol'. Together they form a unique fingerprint.

Cite this