CFP last date
22 April 2024
Reseach Article

A Review on Black Hole Attack in Mobile Adhoc Network

by Vimal Dhote, Anand Motwani, Jyoti Sondhi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 11
Year of Publication: 2015
Authors: Vimal Dhote, Anand Motwani, Jyoti Sondhi
10.5120/20377-1962

Vimal Dhote, Anand Motwani, Jyoti Sondhi . A Review on Black Hole Attack in Mobile Adhoc Network. International Journal of Computer Applications. 116, 11 ( April 2015), 1-5. DOI=10.5120/20377-1962

@article{ 10.5120/20377-1962,
author = { Vimal Dhote, Anand Motwani, Jyoti Sondhi },
title = { A Review on Black Hole Attack in Mobile Adhoc Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 11 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number11/20377-1962/ },
doi = { 10.5120/20377-1962 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:47.529400+05:30
%A Vimal Dhote
%A Anand Motwani
%A Jyoti Sondhi
%T A Review on Black Hole Attack in Mobile Adhoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 11
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network is self- configuring and infrastructure less network. Due to its dynamic nature, it is more susceptible to severe type of attacks. An assortment of attacks is there to mischief the dexterous working of MANET. One of these attacks is the Black Hole attack which leads to dropping of messages. Attacking node leading agrees to forward packets and then not succeeded to do so. Black Hole attack may take place due to a malicious node which is consciously misbehaving as well as a smashed node interface. In any case, nodes in the network will continuously trying to find a route for the destination, which makes the node consume its battery in addition to losing packets. In this paper we present the literature study of various approaches of Black hole attack propose by researchers in their research. The merits and demerits of the different approaches are also presented.

References
  1. Anu Bala, Rajkumari and Jagpreet Singh "Investigation of Blackhole Attack on AODV in MANET" In Journal of Emerging Technologies in WEB Intelligence, Vol. 2, No. 2, May 2010
  2. Dixon, and Kendall E. Nygard. "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. " In International Conference on Wireless Networks, pp. 570–575, 2003.
  3. C. Perkins, E. Belding-Royer, and S. Das, "Ad-hocon-demand distance vector (AODV) routing", InternetDraft, RFC 3561, July 2003.
  4. Hongmei Deng, Wei Li, and Dharma P. Agarwal, "Routing Security in Wireless Ad Hoc Networks", University of Cincinnati, IEEE Communication magazine,Vol. 40, no. 10, October 2002.
  5. Chen Hongsong, Ji Zhenzhou and Hu Mingzeng, "A Novel Security Agent Scheme for Aodv Routing ProtocolBased on Thread State Transition". Asian Journal of Information Technology, 5 (1):54-60, 2006.
  6. Bracha Hod, "Cooperative and Reliable Packet-Forwarding on top of AODV",www. cs. huji. ac. il/dolev/pubs/reliable-aodv. pdf, 2005.
  7. Mamta Sengar, Pawan Prakash Singh, Savita Shiwani3, "Detection of Black Hole Attack In MANET Using FBC Technique", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 2, March – April 2013 ISSN 2278-6856.
  8. Nishu kalia, Kundan Munjal "Multiple Black Hole Node Attack Detection Scheme in MANET by Modifying AODV Protocol", International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-3, February 2013.
  9. Payal N. Raj, Prashant B. Swadas "DPRAODV: A Dyanamic Learning System AgainstBlack Hole Attack In Aodv Based Manet" IJCSI International Journal of Computer Science Issues, Vol. 2, pp 54-59 2009.
  10. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kat, Abbas Jamalipour, and Yoshiaki Nemoto, "Detecting Black Hole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method", International Journal of Network Security, Vol. 5, No. 3, P. P 338-346, Nov. 2007.
  11. Vasanthavalli. S, R. Bhargava Rama Gowd,S. Thenappan "Peruse Of Black Hole Attack and Prevention Using AODV on MANET", International Journal of Innovative Research in Science Engineering and Technology,Vol. 3, Issue 5, May 2014, ISSN: 2319-8753.
  12. Dhaval Thakar, Nainesh Prajapati "A Modified AODV – Algorithm for prevention of Black hole attack in Mobile Adhoc Networks" International Journal of Conceptions on Electrical and Electronics Engineering Vol. 1, Issue 1, Oct 2013; ISSN: 2345 – 9603.
  13. Rutvij H. Jhaveri,Sankita J. Patel,Devesh C. Jinwala "Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs", INFOCOMP 2013.
  14. Dokurer,Seimih "Simulation of Black hole Attackin wireless ad-hoc Networks" Master's Thesis Atihm University,Septeber 2006
  15. Fan-Hsun Tseng, Li-der chou and Han-chieh chao, "A survey of black hole attack in wireless mobile adhoc networks", springer journal 2011.
  16. Sun B,Guan Y and Pooch UW, "Detecting Black hole Attack in Mobile Adhoc Networks" ,Paper presented T 5th European Personal Mobile Communication Conference, April 2003.
  17. Harsh Pratap Singh, Rashmi Singh, "A mechanism for discovery and prevention of cooperative black hole attack in mobile ad hoc network using AODV protocol", International Conference on Electronics and Communication Systems (ICECS) 2014 , Page(s):1 - 8 Print ISBN:978-1-4799-2321-2
Index Terms

Computer Science
Information Sciences

Keywords

MANET Black hole attack Security threats dynamic