CFP last date
22 April 2024
Reseach Article

Detection and Prevention Mechanism of Black Hole and Sybil Attack in Mobile Ad Hoc Network: A Review

by Aparna Raj, Pankaj Kumar Vyas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 1
Year of Publication: 2016
Authors: Aparna Raj, Pankaj Kumar Vyas
10.5120/ijca2016912027

Aparna Raj, Pankaj Kumar Vyas . Detection and Prevention Mechanism of Black Hole and Sybil Attack in Mobile Ad Hoc Network: A Review. International Journal of Computer Applications. 154, 1 ( Nov 2016), 35-40. DOI=10.5120/ijca2016912027

@article{ 10.5120/ijca2016912027,
author = { Aparna Raj, Pankaj Kumar Vyas },
title = { Detection and Prevention Mechanism of Black Hole and Sybil Attack in Mobile Ad Hoc Network: A Review },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 1 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number1/26459-2016912027/ },
doi = { 10.5120/ijca2016912027 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:01.617798+05:30
%A Aparna Raj
%A Pankaj Kumar Vyas
%T Detection and Prevention Mechanism of Black Hole and Sybil Attack in Mobile Ad Hoc Network: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 1
%P 35-40
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is the major anxiety in mobile ad hoc network because of its characteristics such as lack of central coordination, dynamic topology; infrastructure less. In such network nodes can easily be in and out and each node has capability to route the packets.Ad hoc network is more susceptible to various kinds of threats such as black hole, Sybil attack, worm hole attack, denial of service attack, replay attack etc. Black hole attack advertises itself that has fresh shortest or optimum route to the destination and Sybil attack may engender false identities of number of additional nodes. For the detection and removal of these attack different author proposed various mechanisms. In this paper, we present the review of literature of an assortment of proposed mechanism of black hole and Sybil attack. We also discuss the pros and cons of proposed and implemented mechanism of different authors.

References
  1. Vinay Singh, Sanjay Kumar “Black Hole Detection in MANET Using Modified AODV Protocol”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 4, Issue 2, February 2016 ISSN (Online): 2320-9801.
  2. Nidhiya Krishna “Detection and Prevention of Sybil Attack in Networks”, International Journal of Engineering Science and Computing, April 2016, Volume 6 Issue No. 4 ISSN 2321 3361.
  3. Bhoomi Patel, JyotiParmar “Detection of Black Hole And Sybil Attack in MANET”, International Journal Of Innovative Research In Technology, Volume 2 Issue 8, January 2016 , ISSN: 2349-6002.
  4. Deepak Baberwal, Mahesh Bundele, “Detection and Prevention of Black Hole Attack for Dynamic Source Routing in Mobile ad-hoc Network”, International Journal of Innovations & Advancement in Computer Science. ISSN 2347 – 8616 Volume 4, Special Issue March 2015.
  5. AnamikaPareek, Mayank Sharma “Detection and Prevention of Sybil Attack in MANET using MAC Address”, International Journal of Computer Applications (0975 – 8887) Volume 122 – No.21, July 2015.
  6. Pooja, R. K. Chauhan “An assessment based approach to detect black hole attack in MANET”, International Conference on Computing, Communication & Automation (ICCCA), in 2015 Proceeding of IEEE Page(s):552 – 557.
  7. Ayesha Siddiqua, KotariSridevi ; Arshad Ahmad Khan Mohammed “Preventing black hole attacks in MlANETs using secure knowledge algorithm”, International Conference on Signal Processing And Communication Engineering Systems (SPACES), 2015 Proceeding of IEEE Page(s): 421 – 425.
  8. S. Karthika, N. Vanitha, “Secure Routing Protocol in Delay Tolerant Networks Using Fuzzy Logic Algorithm”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 4, Issue 5, May 2015, ISSN (Print) : 2320 – 3765.
  9. Priya Jain, RashmiNigoti “A Novel Technique for Sybil Attack Detection and Prevention in MANET”, International Journal of Computer Applications (0975 – 8887) Volume 130 – No.9, November 2015.
  10. Harsh Pratap Singh, Rashmi Singh, “A mechanism for discovery and prevention of cooperative black hole attack in mobile ad hoc network using AODV protocol”, International Conference on Electronics and Communication Systems (ICECS) 2014 , Page(s):1 - 8 Print, ISBN:978-1-4799-2321-2.
  11. Danish Shehzad, ArifIqbal Umar, Noor Ul Amin, and WaqarIshaq, “A Novel Mechanism for Detection of Sybil Attack in MANETs”, International conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, 2014 Dubai (UAE).
  12. R. Vintoh Kumar, P. Ramesh , H. Abdul Rauf “Cluster based enhanced Sybil attack detection in MANET through integration of RSSI and CRL”, International Conference on Recent Trends in Information Technology (ICRTIT), 2014 Page(s):1 – 7.
  13. Dr. DeepaliVirmani ,ManasHemrajani , ShringaricaChandel, “Exponential Trust Based Mechanism to Detect Black Hole attack in Wireless Sensor Network”. In proceeding of IEEExplore-2014.
  14. GayatriWahane, Ashok Kanthe “Technique for Detection of Cooperative Black Hole Attack In MANET”, IOSR Journal of Computer Science (IOSR-JCE) 2014 e-ISSN: 2278-0661, p-ISSN: 2278-8727 PP 59-67.
  15. Wei Wei, FengyuanXu, Chiu C. Tan and Qun Li “Sybil Defender: A Defense Mechanism for Sybil Attacks in Large Social Networks” IEEE Transaction on Parallel and Distributed Systems, Dec. 2013. Vol. 24, P. 2492-2502.
  16. Isaac Woungang,  Sanjay Kumar Dhurandher, RajenderDheeraPeddi and Mohammad S. Obaidat “Detecting blackhole attacks on DSR-based mobile ad hoc networks”, International Conference on Computer, Information and Telecommunication Systems (CITS), Proceeding of IEEE on May 2012 Page(s):1 – 5.
  17. Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, “Channel-Based Detection of Sybil Attacks in Wireless Networks” IEEE Transactions on Information Forensics and Security, Vol. 4, No. 3, September 2009
  18. K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007.
  19. Yu CW, Wu T-K, Cheng RH, Chang SC (2007) A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Network. Paper presented at the PAKDD workshops, Nanjing, China, 22-25 May 2007.
  20. Weerasinghe H, Fu H “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, Paper presented at the Future Generation Communication and Networking, Jeju-Island, Korea, 6-8 December 2007.
  21. Chris Piro, Clay Shields ; Brian Neil Levine “Detecting the Sybil Attack in Mobile Ad hoc Networks”, Securecomm and Workshops, Proceeding of IEEE 2006 Page(s):1 – 11.
  22. Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K (2003) Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. Paper presented at the International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003.
  23. Deng H., Li W. and Agrawal, D.P., "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol.40, no.10, pp. 70- 75, October 2002.
  24. P. V. Jani “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Black hole attack Security threats dynamic