CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Snapshot of Black Hole Attack Detection in MANET

by Moirangthem Marjit Singh, Ankita Singh, Jyotsana Kumar Mandal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 14
Year of Publication: 2015
Authors: Moirangthem Marjit Singh, Ankita Singh, Jyotsana Kumar Mandal
10.5120/20406-2759

Moirangthem Marjit Singh, Ankita Singh, Jyotsana Kumar Mandal . A Snapshot of Black Hole Attack Detection in MANET. International Journal of Computer Applications. 116, 14 ( April 2015), 23-26. DOI=10.5120/20406-2759

@article{ 10.5120/20406-2759,
author = { Moirangthem Marjit Singh, Ankita Singh, Jyotsana Kumar Mandal },
title = { A Snapshot of Black Hole Attack Detection in MANET },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 14 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number14/20406-2759/ },
doi = { 10.5120/20406-2759 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:57:07.964682+05:30
%A Moirangthem Marjit Singh
%A Ankita Singh
%A Jyotsana Kumar Mandal
%T A Snapshot of Black Hole Attack Detection in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 14
%P 23-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Black hole attack is a very common type of security attack found in Mobile Adhoc Network (MANET). In Black hole attack, the malicious node attracts all the data packets towards it using some false means and affects the data transmission in many ways, such as dropping of the packets. Black hole attack is vulnerable to security in MANET routing protocol. The paper focuses to provide a snapshot on various methods of detecting black hole attack in MANET and critically reviews them.

References
  1. Shraddha Raut and SD Chede, "Detection and Removal of Black Hole in Mobile Adhoc Network", International Journal of Electrical and Electronics Engineering (IJEEE) volume-1 Issue 4, 2012 pp. 84-86
  2. Neeraj Arora and N. C. Barwar,"Performance Analysis of Black Hole Attack on different MANET Routing Protocols", International Journal of Computer Science and Information technologies, volume 5(3), 2014, pp 4417-4419.
  3. C. E. Perkins and E. M. Royer, "Ad-hoc On Demand Distance Vector Routing", Proceedings of the 2nd IEEE workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp 90-100.
  4. Bo Sun, Yong Guan, Jian Chen, Udo W. Pooch, "Detecting Black-hole Attack in Mobile Ad-Hoc Network", 5th European Personal mobile Communications Conference, Glasgow, April 2003 Volume 492, Issue 22-25 pp. 490-495.
  5. Shekhar Tondon and Praneet Saurabh, "A PDRR based detection technique for blackhole attack in MANET", International Journal of Computer Science and Information Technologies, Vol. 2 (4) , 2011, pp 1513-1516
  6. Ankur Mishra, Ranjeet Jaiswal and Sanjay Sharma, "A Novel Approach for Detecting and Eliminating Cooperative Black Hole Attack using Advanced DRI Table in Ad hoc Network", 3rd IEEE International Advanced Computing Conference(IACC), 2013, pp 499-504.
  7. Govind Sharma, Manish Gupta, " Black Hole Detection in MANET Using AODV Routing Protocol", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012, pp 297-303.
  8. Vipin Khandelwal and Dinesh Goyal, " BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013, pp 1555-1559.
  9. Mamta Sengar, Pawan Prakash Singh, Savita Shiwani, "Detection of Black Hole Attack In MANET Using FBC Technique", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 2, March – April 2013, pp 269-272.
  10. Ms. Chetana Khetmal1, Prof. Shailendra Kelkar2, Mr. Nilesh Bhosale3, "MANET: Black Hole Node Detection in AODV", International Journal of Computational Engineering Research, Vol, 03, Issue, 6, pp 79-85.
  11. J. Ramkumar, R. Murugeswari, " Fuzzy Logic Approach for Detecting Black Hole Attack in Hybrid Wireless Mesh Network", 2014 IEEE International Conference on Innovations in Engineering and Technology (ICIET'14), Volume 3, Special Issue 3, March 2014, pp 877-882.
  12. Suparna Biswas, Tanumoy Nag Sarmistha Neogy, "Trust Based Energy Efficient Detection and Avoidance of Black Hole Attack to Ensure Secure Routing in MANET", Applications and Innovations in Mobile Computing (AIMoC), 2014, pp 157-164.
  13. Dhaval Dave Pranav Dave, "An Effective Black Hole Attack Detection Mechanism using Permutation Based Acknowledgement in MANET," International conference on Advances in Computing, Communications and Informatics(ICACCI), 2014, pp 1690-1696.
  14. J. Sen, S. Koilakonda, and A. Ukil, "A Mechanism for Detection of Cooperative Black hole Attack in Mobile Ad Hoc Networks", In Proceedings of the 2nd International Conference on Intelligent Systems, Modeling and Simulation (ISMS'11), pp. 338-343, Phnom Penh, Cambodia, January 25-27, 2011.
  15. XiaoYang Zhang, Yuji Sekiya and Yasushi Wakahara, "Proposal of a Method to Detect Black Hole Attack in MANET", International symposium on Autonomous Decentralized system (ISADS), 2009, pp 1-6
  16. Bar, R. K, Mandal, J. K, Singh, M. M. ,"QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack", Elsevier Procedia Technology volume 10,2013, Elsevier DOI: 10. 1016/j. protcy. 2013. 12. 392, pp 530-537, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Network security Black hole attacks MANET