CFP last date
20 May 2024
Reseach Article

A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET

by Rashmi Ahlawat, Setu K Chaturvedi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 1
Year of Publication: 2013
Authors: Rashmi Ahlawat, Setu K Chaturvedi
10.5120/13827-1577

Rashmi Ahlawat, Setu K Chaturvedi . A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET. International Journal of Computer Applications. 80, 1 ( October 2013), 34-38. DOI=10.5120/13827-1577

@article{ 10.5120/13827-1577,
author = { Rashmi Ahlawat, Setu K Chaturvedi },
title = { A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 1 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number1/13827-1577/ },
doi = { 10.5120/13827-1577 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:26.415723+05:30
%A Rashmi Ahlawat
%A Setu K Chaturvedi
%T A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 1
%P 34-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless communication system which do not require any fixed infrastructure for the establishment of its configuration is called Mobile Adhoc Network(MANET). This infrastructure leads to the misbehavior of some nodes which attack and degrade the performance of the network. In this paper we perform an analysis of various schemes that can be applied to improve the performance of MANET when a black hole attack occurs and provide a solution using anomaly based IDS scheme.

References
  1. HaoYang, Haiyun & Fan Ye – "Security in mobile adhoc networks: Challenges and solutions," Pg. 38-47, Vol 11, issue 1, Feb 2004.
  2. Chlamtac, I. , Conti, M. , and Liu, J. J. -N. "Mobile adhoc networking: imperatives and challenges", Ad Hoc Networks, 1(1), 2003, pp. 13–6
  3. G. Vigna, S. Gwalani and K. Srinivasan, "An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks", Proc. of the 20th Annual Computer Security Applications Conference (ACSAC'04).
  4. P. Ning and K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad-Hoc Routing Protocols", Proc. of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY. , June 2003
  5. D. Johnson, D. Maltz and J. Broch, "DSR the Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks". Ad Hoc networking, Chapter 5, page 139-172. Addison Wesley, 2001.
  6. Sabina Barakovic ,Suad Kasapovic,and Jasmina Barakovic "Comparision of MANET Routing Protocols in Different Traffic and Mobility Models", Telfor Journal,Vol. 2,No. 1,2010.
  7. F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks", Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science, 1999. University of Cambridge Computer Laboratory.
  8. Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi and Prabir Bhattacharya "Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET", IEEE Transactions on Dependable and Secure Computing, vol. 99, no. 1, 2008 .
  9. Ioanna Stamouli, "Real-time Intrusion Detection for Ad hoc Networks", in 2003.
  10. Tiranuch Anantvalee, Jie Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," c 2006 Springer.
  11. Kozma W, Lazos L (2009) REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, 16-18 March 2009
  12. Fan-Hsun Tseng,Li-Der Chou,Han-Chieh Chao, "A survey of black hole attacks in wireless mobile ad hoc networks", Tseng ct. al. Human-Centric Computing and Information Sciences, 2011.
  13. Herminder Singh, Shweta "An approach for detection and removal of Black hole In MANETS" International Journal of Researh in IT& Management (IJRIM) Volume 1, Issue 2 (June, 2011).
  14. Yaser khamayseh, Abdulraheem Bader, Wail Mardini, and Muneer BaniYasein, "A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks", International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3, No. 1, April 2011.
  15. Raja Karpaga Brinda . R, Chandrasekar. P " Detection and Removal of Co-Operative Black HoleBlack Hole Attack in Manet ", International Journal of Computer Applications (0975 – 8887) Volume 43– No. 11, April 2012.
  16. Jaspal Kumar, M. Kulkarni, Daya Gupta " Effect of Black Hole Attack on MANET Routing Protocols", I. J. Computer Network and Information Security, 5,pp. 64-72 Published Online April 2013 in MECS.
Index Terms

Computer Science
Information Sciences

Keywords

DSR AODV MANET IDS malicious nodes