Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Effect Analysis of Black Hole Attack of AODV Protocol in MANET using Table Driven Approach

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 119 - Number 9
Year of Publication: 2015
Richa Kudesia
Ankur Jain
Bharti Jain

Richa Kudesia, Ankur Jain and Bharti Jain. Article: Effect Analysis of Black Hole Attack of AODV Protocol in MANET using Table Driven Approach. International Journal of Computer Applications 119(9):28-35, June 2015. Full text available. BibTeX

	author = {Richa Kudesia and Ankur Jain and Bharti Jain},
	title = {Article: Effect Analysis of Black Hole Attack of AODV Protocol in MANET using Table Driven Approach},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {119},
	number = {9},
	pages = {28-35},
	month = {June},
	note = {Full text available}


MANET is a wireless network that allows user to communicate and transfer information without using any infrastructure and irrespective of their location. They are very useful for home uses, for military uses etc. Though they are very useful in day to day life, major threats are also there to attack over it; some of them are wormhole attack, denial of service, eavesdropping etc. Black Hole attack is one of the major attacks on MANET. In this research paper, the effect of black hole over the network is evaluated by varying certain values of the network like number of nodes, pause time, area and speed. This paper shows that despite of presence of black hole in the network, the increament and decrement of certain values also affect the performance of MANET. For this, a table has been used which stores all the values of the parameters with and without black hole in the network obtaining by variations among the several values. Before and after values are stored which are afterwards will use for the analysis of the performance of the protocol. The protocol used in this paper is AODV (Ad-Hoc on Demand Distance Vector) protocol.


  • Ravinder Kaur, Jyoti Kalra, "Detection and Prevention of Black Hole Attack with Digital Signature", Vol. 4, Issue 8, August 2014.
  • T. Manikandan, S. Shitharth, C. Senthilkumar, C. Sebastinalbina, N. Kamaraj, "Removal of Selective Black Hole Attack in MANET by AODV Protocol", Vol. 3, Issue 3, March 2014.
  • Jaspinder Kaur, Birinder Singh, "Detect and Isolate Black hole attack in MANET using AODV Protocol", Vol. 3, Issue 2, February 2014, IJARCET.
  • Bala Manju, Kaur Harjeet, SahniVarsha, " Study Of Black Hole Attack using different Routing Protocols in MANET ", Vol. 2, Issue 7 July, 2013.
  • Akshat Jain, Shekhar Singh Sengar,"Colluding black holes detection in MANET", Vol. 2, Issue 1, January 2013, International Journal of Engineering Research & Technology.
  • Sushil Kumar Chamoli, Santosh Kumar, Deepak Singh rana," Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks", Vol. 3, Issue 4, 1395-1399.
  • Ira Nath, Dr. Rituparna Chaki, "BHAPSC: A new Black Hole Attack Prevention System in clustered MANET", Vol. 2, Issue 8, August 2012, International Journal of Advances Research in Computer Science and Software Engineering.
  • Ekta Barkhodia, Parulpreet Singh, Gurleen kaur walia, "Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET ", Vol. 2, Issue 3, June 2012
  • Irshad Ullah, Shoaib Ur Rehman "Analysis of Black Hole attack on MANETs using different MANET Routing Protocols. " MEE 10:62, in June, 2010.
  • Latha Tamilselvan, Dr. V Sankaranarayanan,"Prevention of co-operative Black Hole Attack in MANET", Vol. 3, No. 5, May 2008.
  • Marko Jahnke, Jens Tolle, "Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs", IEEE Computer Society Washington, DC, USA, 2007.
  • Semih Dokurer "Simulation of Black Hole attack in wireless Ad-hoc Networks" in September 2006.
  • Hidehisa Nakayama, "Detecting black hole attack on AODV based MANET by dynamic learning method".
  • Sun, Y. Guan, J. Chen and U. W. Pooch, "Detecting black-hole attack in mobile ad hoc networks", Proc. 5th European Personal Mobile Communications Conference, Apr. 2003, pp. 490-495.