Detection and Prevention of Black hole Attack in Mobile Ad hoc Network: a Survey

Main Article Content

Drashti S Vyas

Abstract

Mobile ad hoc networks are useful when there is no infrastructure available. It provides any where, any time communication. In MANET nodes are mobile and topology is unpredictable. Mobile ad hoc networks are more vulnerable to malicious attacks. Security is very crucial parameter for mobile ad hoc network because of its characteristics such as limited power and bandwidth, dynamic topology and open medium. Possible attacks on mobile ad hoc networks include wormhole. Denial of service, blackhole grayhole, sinkhole etc. Blackhole attack is very dangerous for mobile ad hoc networks because it drops all the packets that it receives. So the packet delivery ratio and throughput decreases sharply. We have presented several existing methods to detect black hole attack in mobile ad hoc network.

Downloads

Download data is not yet available.

Article Details

How to Cite
Drashti S Vyas. “Detection and Prevention of Black Hole Attack in Mobile Ad Hoc Network: A Survey”. Technix International Journal for Engineering Research, vol. 1, no. 10, Oct. 2014, pp. 152-5, https://tijer.org/index.php/tijer/article/view/100.
Section
Research Articles

References

Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,” Sixth Annual International Conference on Mobile Computing and Networking (MobiCom’2000), Boston, August 6-11, 2000.

Kriti Patidar, Vandana Dubey, “Modification in Routing Mechanism of AODV for Defending Blackhole and Wormhole Attacks” IEEE International conference on IT in Business, Industry and Government, 2014

Ms Monika Y. Dangore, Mr Santosh S. Sambare, “Detecting And Overcoming Blackhole Attack in AODV Protocol” International Conference on Cloud & Ubiquitous Computing & Emerging Technologies 2013

Jiwen CAI, Ping YI, Jialin CHEN, Zhiyang WANG, Ning LIU, “An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network” 24th IEEE International Conference on Advanced Information Networking and Applications 2010

Manuel D. Serrat-Olmos, Enrique Hernández-Orallo, Juan-Carlos Cano, Carlos T. Calafate, Pietro Manzoni, “Accurate Detection of Black Holes in MANETs using Collaborative Bayesian Watchdogs” IEEE International Conference 2012

Mohammad Taqi Soleimani and Abdorasoul Ghasemi, “Detecting Black Hole Attack in Wireless Ad Hoc Networks Based On Learning Automata”

Kulbhushan, Jagpreet Singh, “Fuzzy Logic based Intrusion Detection System against Blackhole Attack on AODV in MANET” IJCA Special Issue on “Network Security and Cryptography NSC 2011

Yibeltal Fantahun Alem and Zhao Cheng Xuan, “Preventing Black hole Attack in Mobile Ad-hoc Networks using Anomaly Detection” IEEE International Conference-2010

Gundeep Singh Bindra, Ashish Kapoor , Ashish Narang , Arjun Agrawal, “Detection and Removal of Co-operative Black hole and Gray hole Attacks in MANETs” 2012 International Conference on System Engineering and Technology September 11-12, 2012, Bandung, Indonesia

Rutvij H. Jhaveri, “MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs” Third International Conference on Advanced Computing & Communication Technologies 2013

Vimal Kumar, Rakesh Kumar; “An Adaptive Approach for Detection of Blackhole Attack in Mobile Adhoc Network” International Conference on Intelligent Computing, Communication and Convergence, Elsevier 2015

Gupta, K. Rana; “Assessment of various Attacks on AODV in malicious environment” IEEE International Conference on Next Generation Computing Technologies, 2015

N. Arya, U.Singh, S. Singh; “Detecting and avoiding of wormhole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm” IEEE International Conference on Computer, Communication and Control, 2015

S. Jain, A. Khuteta; “Detecting and overcoming blackhole attack in mobile adhoc network” IEEE International Conference on Green Computing and Internet of Things, 2015

K. Singh, A. Boparai, V. Handa, S. Rani; “Performance analysis of security attacks and improvements of routing protocols in MANET” IEEE International Conference on Computer Science, Computer Engineering and Social Media, 2015