Article
Version 1
Preserved in Portico This version is not peer-reviewed
Protecting AODV Protocol from Black Hole Attack in WSN
Version 1
: Received: 26 June 2023 / Approved: 30 June 2023 / Online: 30 June 2023 (08:58:10 CEST)
How to cite: AKOURMIS, S.; Fakhri, Y.; Rahmani, M. D. Protecting AODV Protocol from Black Hole Attack in WSN. Preprints 2023, 2023062186. https://doi.org/10.20944/preprints202306.2186.v1 AKOURMIS, S.; Fakhri, Y.; Rahmani, M. D. Protecting AODV Protocol from Black Hole Attack in WSN. Preprints 2023, 2023062186. https://doi.org/10.20944/preprints202306.2186.v1
Abstract
The development of wireless sensor networks (WSNs) technology comes with inherent limitations and vulnerabilities that make it exploitable by intruders. The fundamental goal of this article is to solve security problems related to black hole attacks, which interfere with the proper performance of the network and can lead to data leakage and loss. The proposed solution in this article is to apply IDS to a WSN for the first time. We also used the NS2.35 simulator to compare the three routing protocols, AODV, AODV under Hacker Node (HNAODV), and the proposed solution (IDSHNAODV) in the WSN model to reduce the effects of black hole attacks.
Keywords
Wireless Sensor Networks (WSNs); AODV; IDS (Intrusion Detection System); black hole attack; RREP (Route Reply) message; Security attack
Subject
Engineering, Telecommunications
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment