Research Article
BibTex RIS Cite

AOMDV Protokolünde Black Hole Ataklara Karşı Geliştirilmiş Güvenlik Uygulaması

Year 2017, Volume: 10 Issue: 2, 221 - 229, 28.04.2017
https://doi.org/10.17671/gazibtd.309306

Abstract

İletişimin büyük kısmını oluşturan kablosuz ağların
kullanımı hızlı bir şekilde artmaktadır. Tasarsız ağlar sıklıkla hareketli
düğümlerden oluşan alt yapısız kablosuz ağlardır. Tasarsız ağlarda düğümler hem
diğer düğümlerle iletişim kurabilir hem de paketleri ileterek yönlendirici
görevi üstlenirler. Bu ağlar arama kurtarma, ofis, kampüs, konferans salonu,
üniversite ve şehir ağlarında kullanılmaktadırlar. Tasarsız ağlarda düğümlerin
hareketli olması,  bir altyapının mevcut
olmaması,  bant genişliğinin ve güç
kapasitesinin sınırlı olması bu ağların en önemli sorunlarındandır. Düğümlerin
hareketliliği topolojinin hızlı bir şekilde değişmesine ve kurulan yolların
bozulmasına neden olmaktadır. Bu çalışmada, ağın güvenliğini bozacak black hole
ataklar tasarlayıp, ağın güvenirliğini artıracak güvenlik uygulaması
geliştirilmiştir. Çalışmada tasarsız ağlarda kullanılan en güncel
protokollerden birisi olan Ad hoc on-demand multipath distance vector (AOMDV)
protokolü kullanılmıştır. Bu amaçla, güvenlik uygulamasında senaryolar
üretilmiş olup, daha sonra da bu senaryolardan yararlanılarak AOMDV
protokolünde güvenlik uygulamasının altyapısı oluşturulmuştur. Çalışmada benzetim
aracı olarak Network Simulator (NS 2) 
programının 2.35 sürümü ve diğer ağ benzetim
yazılımları için yardımcı programlar olan tracegraph202, APP-Tool-master grafik
yazılımları kullanılmıştır.

References

  • [1] Nevatia, Y., “Ad-Hoc Routing for USARSim”, Networks and Distributed Systems Seminar, 2007.
  • [2] Jani, P.V. “Security within AdHoc Networking,” Position Paper, PAMPAS Workshop, 2002.
  • [3] Gorantala, K. “Routing Protocols in Mobile Ad-hoc Networks”, Master Thesis, UMEA University, 2006.
  • [4] Gupta, P. ve Pandey, S. “Performance Analysis of AOMDV and AODV Routing Protocol in MANET”, International Journal of Advanced Research in Computer Science and Software Engineering,vol.5(11), 2015.
  • [5] Charles E. P. ve Elizabeth M. R. “Ad hoc on-demand distance vector routing”, July 2003.
  • [6] Tiwari, A. ve Verma, N. ” A Novel Scheme for Intrusion Detection & Anticipation of Black Hole & Gray Hole Attacks In AODV Based MANET using ZED”, International Journal Of Engineering And Computer Science ISSN:2319-7242 vol.3(5), 5744-5751, 2014.
  • [7] Kurosawa, S. ve Nakayama, H. ve Kato, N. ve Jamalipour, A. ve Nemoto, Y. “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”. International Journal of Network Security, vol.5(3), 338–346, 2007.
  • [8] Zonglin, L. ve Guangming, H. ve Xingmiao, Y. “ Spatial Correlation Detection of DDoS attack”, International Conference on Communication, Circuits and System (ICCCAS 2009), 304-308, 2009.
  • [9] Alves, J. ve Wille, ECG., “P-AOMDV: An improved routing protocol for V2V communication based on public transport backbones”, Transactıons on Emerging Telecommunications Technologies, vol:27(12), 1653-1663,2016.
  • [10] Al-Nahari, A., Mohamad, MM.,"Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks", PLOS ONE, vol:11(6), 2016. [11] Agrawal, S. ve Jain, S. ve Sharma, S. “A Survey of Routing Attacks and Security Measures in Mobile Ad-hoc Networks”, Journal of Computing, vol.3(1), 2011.
  • [12] Revathi, B. ve Geetha, D. “A Survey of Cooperative Black and Gray hole Attack in MANET”, International Journal of C.S. And Management Research ,vol 1(2) , September 2012.
  • [13] Gupta, H. ve Shrivastav, S. ve Sharma, S. “Detecting the DOS Attacks in AOMDV Using AOMDV-IDS Routing”, International Conference on Computational Intelligence and Communication Networks, 2013.
  • [14] Wang, K. ve Chen, J. ve Zhou, H. ve Qin, Y. ”Content-Centric Networking: Efect of Content Cachingon Mitigating DoS Attack”, International Journal of Computer Science Issue, vol.9, 43-52, 2012.
  • [15] Wazid, M.,Das, AK., Kumari, S. ve Khan, MK., "Design of sinkhole node detection mechanism for hierarchical wireless sensor networks", Security and Communication Networks, vol:9(17), 45964614, 2016.
  • [16] Khanna, N. ve Sharma, P.,"Mitigating Blackhole and Grayhole Attack in MANET using Enhanced AODV with TLTB Mechanism", International Journal of Future Generation Communication and Networking, vol:9(8),129-140, 2016.
  • [17] Chadha, M. ve Joon R., ve Sandeep, “Simulation and Comparison of AODV, DSR and AOMDV Routing Protocols in MANETs”, International Journal of Soft Computing and Engineering (IJSCE), vol 2(3), 2231-2307, 2012.
  • [18] Bhalaji, N. ve Shanmugam, A. “A Trust Based Model to Mitigate Black Hole Attacks in DSR Based Manet”, European Journal of Scientific Research ISSN 1450-216X, vol.50(1), 6-15, 2011.
  • [19]Ahmed, M. ve Md. Hussain, A. “Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks” published in IEEE, 2014.
  • [20] Chen H.L. ve Lee C.H., “Two Hops Backup Routing Protocol in Mobile Ad Hoc Networks”,11th International Conference on Parallel and Distributed Systems Workshops (ICPADS'05), 600-604, 2005.
  • [21] Internet: http://www.isi.edu/nsnam/ns/tutorial/, 2016.
Year 2017, Volume: 10 Issue: 2, 221 - 229, 28.04.2017
https://doi.org/10.17671/gazibtd.309306

Abstract

References

  • [1] Nevatia, Y., “Ad-Hoc Routing for USARSim”, Networks and Distributed Systems Seminar, 2007.
  • [2] Jani, P.V. “Security within AdHoc Networking,” Position Paper, PAMPAS Workshop, 2002.
  • [3] Gorantala, K. “Routing Protocols in Mobile Ad-hoc Networks”, Master Thesis, UMEA University, 2006.
  • [4] Gupta, P. ve Pandey, S. “Performance Analysis of AOMDV and AODV Routing Protocol in MANET”, International Journal of Advanced Research in Computer Science and Software Engineering,vol.5(11), 2015.
  • [5] Charles E. P. ve Elizabeth M. R. “Ad hoc on-demand distance vector routing”, July 2003.
  • [6] Tiwari, A. ve Verma, N. ” A Novel Scheme for Intrusion Detection & Anticipation of Black Hole & Gray Hole Attacks In AODV Based MANET using ZED”, International Journal Of Engineering And Computer Science ISSN:2319-7242 vol.3(5), 5744-5751, 2014.
  • [7] Kurosawa, S. ve Nakayama, H. ve Kato, N. ve Jamalipour, A. ve Nemoto, Y. “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”. International Journal of Network Security, vol.5(3), 338–346, 2007.
  • [8] Zonglin, L. ve Guangming, H. ve Xingmiao, Y. “ Spatial Correlation Detection of DDoS attack”, International Conference on Communication, Circuits and System (ICCCAS 2009), 304-308, 2009.
  • [9] Alves, J. ve Wille, ECG., “P-AOMDV: An improved routing protocol for V2V communication based on public transport backbones”, Transactıons on Emerging Telecommunications Technologies, vol:27(12), 1653-1663,2016.
  • [10] Al-Nahari, A., Mohamad, MM.,"Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks", PLOS ONE, vol:11(6), 2016. [11] Agrawal, S. ve Jain, S. ve Sharma, S. “A Survey of Routing Attacks and Security Measures in Mobile Ad-hoc Networks”, Journal of Computing, vol.3(1), 2011.
  • [12] Revathi, B. ve Geetha, D. “A Survey of Cooperative Black and Gray hole Attack in MANET”, International Journal of C.S. And Management Research ,vol 1(2) , September 2012.
  • [13] Gupta, H. ve Shrivastav, S. ve Sharma, S. “Detecting the DOS Attacks in AOMDV Using AOMDV-IDS Routing”, International Conference on Computational Intelligence and Communication Networks, 2013.
  • [14] Wang, K. ve Chen, J. ve Zhou, H. ve Qin, Y. ”Content-Centric Networking: Efect of Content Cachingon Mitigating DoS Attack”, International Journal of Computer Science Issue, vol.9, 43-52, 2012.
  • [15] Wazid, M.,Das, AK., Kumari, S. ve Khan, MK., "Design of sinkhole node detection mechanism for hierarchical wireless sensor networks", Security and Communication Networks, vol:9(17), 45964614, 2016.
  • [16] Khanna, N. ve Sharma, P.,"Mitigating Blackhole and Grayhole Attack in MANET using Enhanced AODV with TLTB Mechanism", International Journal of Future Generation Communication and Networking, vol:9(8),129-140, 2016.
  • [17] Chadha, M. ve Joon R., ve Sandeep, “Simulation and Comparison of AODV, DSR and AOMDV Routing Protocols in MANETs”, International Journal of Soft Computing and Engineering (IJSCE), vol 2(3), 2231-2307, 2012.
  • [18] Bhalaji, N. ve Shanmugam, A. “A Trust Based Model to Mitigate Black Hole Attacks in DSR Based Manet”, European Journal of Scientific Research ISSN 1450-216X, vol.50(1), 6-15, 2011.
  • [19]Ahmed, M. ve Md. Hussain, A. “Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks” published in IEEE, 2014.
  • [20] Chen H.L. ve Lee C.H., “Two Hops Backup Routing Protocol in Mobile Ad Hoc Networks”,11th International Conference on Parallel and Distributed Systems Workshops (ICPADS'05), 600-604, 2005.
  • [21] Internet: http://www.isi.edu/nsnam/ns/tutorial/, 2016.
There are 20 citations in total.

Details

Journal Section Articles
Authors

Sinan Toklu

Aziz Aydın

Publication Date April 28, 2017
Submission Date April 26, 2017
Published in Issue Year 2017 Volume: 10 Issue: 2

Cite

APA Toklu, S., & Aydın, A. (2017). AOMDV Protokolünde Black Hole Ataklara Karşı Geliştirilmiş Güvenlik Uygulaması. Bilişim Teknolojileri Dergisi, 10(2), 221-229. https://doi.org/10.17671/gazibtd.309306