Methodologies Proposed not used for the Project. Just for the reference - hirenThakor95/Modified-AODV-to-mitigate-black-hole-in-MANETS GitHub Wiki

Methodology - "Proposed" Not Used in the Implementation.

#This research is conducted by reading several published papers. After reading the articles, we concluded that the original protocol is not effective for the blackhole attack. Thus, our hypothesis is to find a new algorithm that improves the security of AODV in terms of mitigating blackhole attacks; we will test our hypothesis using simulation tools such as the NS2 simulator and Ubuntu Linux.

#Flowchart: Flowchart

#The proposed methodology is based on the behaviour of malicious nodes in the network. We will use a very stable node in the MANETs to find a malicious node; we can call this node” IDS node.” The IDS node needs to be created in the network, which is the node inside the network. The IDS node is the node that is maximum stable and cannot change its location frequently. The IDS node starts creating each node's profile; the IDS node will sense its adjacent node, and information of its adjacent node is stored. The stored information contains the packet type, whether it sends control packet or data packet, the data rate of sending packets(CBR or VBR), threshold values. When the network throughput is reduced to threshold values, then the IDS node compares the previous profile of each node with the current profile. The node which has a mismatched profile will be detected as malicious nodes from the network.

#The reactive routing protocols are which establish a path from source to destination when required. The AODV protocol is the most common and best-performing protocol for path establishment in a mobile ad hoc network. In the AODV protocol, the path is established based on the route request and route reply packets. The source node flood route requests packets in the network and nodes adjacent to the destination will reply with the route reply packets. The source has multiple destination options, and the best path is selected based on hop count and sequence number. The path with the least hop count and the maximum sequence number is chosen as the best path The malicious nodes enter the network, which triggers various types of attacks. In the black hole attack, when the malicious nodes receive the route request packets in the network, it will send route reply packets to the destination. The malicious node also presents its maximum sequence number. The source gets forced to select the path from the malicious node to the destination. When the source sends data, the malicious nodes drop all the packets in the network.

#NS2 simulator: The Network Simulator (Version 2), or NS2, is a simple event-driven simulation program that has proven beneficial in researching the dynamic nature of communication networks. NS2 can be used to simulate wired and wireless network functions and protocols (e.g., routing algorithms, TCP, UDP). In general, NS2 allows users to specify network protocols and simulate their behaviour [4]. The simulation provides us with the data about the throughput, delay, and packet loss. We will use this data to compare and contrast with the previous results of the original AODV protocol to test our hypothesis.   #Acronyms

  1. IDS Node: Intrusion Detection System‘s Node
  2. AODV: Ad Hoc On-Demand Vector Routing Protocol
  3. MANETs: Mobile Ad Hoc Networks
  4. CBR: Constant bitrate
  5. VBR: Variable bitrate
  6. UDP: User Datagram Protocol
  7. TCP: Transmission Control Protocol
  8. NS2: Network Simulatior