In recent years, MANETs has become a quite interesting research area amongst various researchers because of their flexibility and independence of network infrastructures, such as base stations. At present, numerous efficient routing protocols have been anticipated for MANET. Many protocols take on a reliable & co-operative environment. However, when malicious-nodes are present, the networks are penetrable to numerous kinds of attacks. In MANET, routing-attacks are peculiarly quite serious. It has many potential-applications which are in completely un-predictable as well as dynamic environment. Routing protocol used here is a form of reactive-routing protocol entitled as AODV. This routing protocol routes is based on demand. The most significant benefit of Ad-hoc On Demand Vector protocol is smallest connection-setup-delay & assignment of specific sequence numbers to destination to identify the latest route. In specification based IDS, definite characteristics of vital-objects are investigated as well as any abnormality is detected. So, this paper the proposed work tries to design and implement Mobile Ad-hoc Networks in AODV protocol. It has been observed that black hole attack prevention has been done using genetic algorithm at good rate.
Mani Arya, “BFO Based Optimized Positioning For Black Hole Attack Mitigation in WSN”, International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 1 – Aug 2014.
Mohammad Wazid, AvitaKatal, Roshan Singh Sachan, R H Goudar and D P Singh, “Detection and Prevention Mechanism for Blackhole Attack in Wireless Sensor Network”, International conference on Communication and Signal Processing, IEEE, pp. 576- 581, 2013.
K.S.Sujatha1, Vydeki Dharmar2, R.S.Bhuvaneswaran3, “Design of Genetic Algorithm based IDS for MANET”, IEEE, pp. 28-35, 2012.
MeenakshiTripathi,M.S.Gaur,V.Laxmi, “Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN”, The 8th International Symposium on Intelligent Systems Techniq, Procedia Computer Science, pp.1101 – 1107, 2013.
Adnan Nadeem and Michael Howarth, A Generalized Intrusion Detection &Prevention Mechanism for Securing MANETs, International Conference on Current Trends in Engineering and Technology, pp. 35-40, 2009 .
Zhao Min, Zhou Jiliu, “Cooperative Black Hole Attack Prevention for Mobile Ad-hoc Networks”, International Symposium on Information Engineering and Electronic Commerce, pp. 26-30, 2009.
Noor M. Asraf, Raja N. Ainon, PhangKeatKeong, “ QOS parameter Optimization using Multi-Objective Genetic Algorithm in MANET”, 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation, pp. 138-143, 2010.
Sunil Taneja and Ashwani Kush,” A Survey of Routing Protocols in Mobile Ad-hoc Networks”, International Journal of Innovation, Management and Technology, vol. 1, no. 3, pp. 279-285, 2010.
SoufieneDjahel, FaridNaıt-abdesselam , and Zonghua Zhang, Mitigating Packet Dropping Problem in Mobile Ad-hoc Networks”, IEEE communications surveys & tutorials, vol. 13, no. 4, pp. 658-672, 2011.
Fan-Hsu n Tseng1 , Li-Der Chou1 and Han-Chieh Chao et. al (2011), A survey of black hole attacks in wireless mobile ad-hoc networks , IEEE Interntional conference, pp. 25-30, 2011.
ShekharTandan and PraneetSaurabh, A PDRR based detection technique for blackhole attack in MANET, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (4) , pp. 1513-1516, 2011.
Shanmuganathan And Mr.T.Anand ,” A Survey on Gray Hole Attack in MANET”, IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC),vol.2, no. 6, December 2012, pp. 647-650, 2012.
SapnaGambhirSaurabh Sharma, ”PPN: Prime Product Number based Malicious Node Detection Scheme for MANETs”, 3rd IEEE International Advance Computing Conference (IACC), pp. 335-340, 2013.
EiEi Khin1 and ThandarPhyu (2014), Impact of black hole attack on aodv routing protocol, IEEE Conference on Computers and electronics applications, pp. 66-70, 2014.
Sandeep Kumar Arora, MubashirYaqoobMantoo, MahnazChishti, NehaChaudhary, 5th International Conference- Confluence The Next Generation Information Technology Summit, pp. 406-410, 2014.
G. D. Wahane, A. M. Kanthe, D. Simunic,” Technique for detection of cooperative black hole attack using truelink in mobile adhoc networks”, MIPRO 2014, IEEE Conference,Opatija,Croatia.