CFP last date
20 May 2024
Reseach Article

Algorithm to Detect and Overcome the Black Hole Attack in MANETs

by Heta Changela, Amit Lathigara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 8
Year of Publication: 2015
Authors: Heta Changela, Amit Lathigara
10.5120/ijca2015905548

Heta Changela, Amit Lathigara . Algorithm to Detect and Overcome the Black Hole Attack in MANETs. International Journal of Computer Applications. 124, 8 ( August 2015), 22-26. DOI=10.5120/ijca2015905548

@article{ 10.5120/ijca2015905548,
author = { Heta Changela, Amit Lathigara },
title = { Algorithm to Detect and Overcome the Black Hole Attack in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 8 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number8/22123-2015905548/ },
doi = { 10.5120/ijca2015905548 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:47.500886+05:30
%A Heta Changela
%A Amit Lathigara
%T Algorithm to Detect and Overcome the Black Hole Attack in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 8
%P 22-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Mobile ad-hoc network to resolve security or any other issue, broadcasting is the common factor in networking. MANETs is very new concept and gives us to very different direction to the internet and when we use it, it will become reduce the cost of both the network i.e. with infrastructure and infrastructure less networks. Mobile Ad-hoc network not need backbone infrastructure support and easy to detect in wireless ad-hoc network is very reliable and also contains the routable networking environment in MANETs. In our paper, the effect of black hole attack in AODV based network is studied. The network parameters like Throughput, Packet Delivery Fraction (PDF) and Average End to End Delay are calculated with normal network (without black hole) and a network with one black hole. The performance of network parameters are compared in all the three scenarios. We proposed some scheme is able to finding string of single malicious nodes which drops all the packets.

References
  1. Ming-Yang Su, Kun-Lin Chiang, Wei-Cheng Liao “ Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks” in International Symposium on Parallel and Distributed Processing with Applications 2010 IEEE.
  2. Gundeep Singh Bindra , Ashish Kapoor , Ashish Narang , Arjun Agrawal “Detection and Removal of Co-operative Blackhole and Grayhole Attacks in MANETs” International Conference on System Engineering and Technology september 11-12 2012.
  3. Mohamed A. Abdelshafy, Peter J. B. King “Analysis of Security Attacks on AODV Routing” 2013 IEEE.
  4. Monika Roopak , Dr. Bvr Reddy “Performance Analysis of Aodv Protocol under Black Hole Attack” International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011.
  5. Sonia, Padmavati “Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protcols” International Journal of Computer Applications Volume 73– No.9, July 2013.
  6. Ankur mishra , Ranjeet Jaiswal , Sanjay Sharma “ A Novel Approach for Detecting and Eliminating Cooperative Black Hole Attack using Advanced DRI Table in Ad hoc Network” 2012 IEEE.
  7. Vishnu K, Amos J Paul “Detection and Removal of Cooperative Black/Gray hole attack in Mobile ADHOC Networks” International Journal of Computer Applications Volume 1 – No. 22 2012.
  8. Ravinder Kaur, Jyoti Kalra “A Review Paper on Detection and Prevention of Black hole in MANET” International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 6, June 2014.
  9. Watchara Saetang and Sakuna Charoenpanyasak, “CAODV Free Blackhole Attack in Ad Hoc Networks” 2012 International Conferenceon Computer Networks and Communication Systems (CNCS 2012).
  10. Abhilasha Sharma, Rajdeep Singh, Ghanshyam Pandey “Detection and Prevention from Black Hole attack in AODV protocol for MANET” International Journal of Computer Applications Volume 50 – No.5, July 2012.
  11. Mangesh Ghonge , Prof. S. U. Nimbhorkar “ Simulation of AODV under Blackhole Attack in MANET” International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 2, February 2012.
  12. Tamilselven L and Sankaranarayanan, “Prevention of Black hole Attack in MANET” International Conference on wireless Broadband and Ultra Wideband Communications, 27-30 August 2007.
  13. Sushil Kumar Chamoli, Santosh Kumar, Deepak Singh Rana “Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks” Computer Technology & Applications,Vol 3 (4), 1395-1399. IJCTA July-August 2012.
  14. Kozma W,Lazos L,”REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits”.Second ACM Conference on Wireless Network Security, Zurich, Switzerland, 16-18 March 2009.
  15. Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre, “Black- Holeand Wormhole Attack in Routing Protocol AODV in MAN International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012.
  16. Sonal,Kiran Narang “Black Hole Attack Detection using Fuzzy Logic” 2013 International Journal Of Science and Research(IJSR),ISSN:2319-7064.
  17. Payal N. Raj, Prashant B. Swadas. “DPRAODV : A Dyanamic Learning System Against Blackhole Attack In Bodv Based Manet.” International Journal of Computer Science Issues, Vol.2, 2009, pp 54-59.
  18. Al-Shurman M, Yoo S-M, Park S (2004) “Black Hole Attack in MobileAd Hoc Networks”, Paper presented at the 42 nd Annual ACM Southeast Regional Conference (ACM-SE’42), Huntsville, Alabama, 2-3 April 2004.
  19. Mistry N, Jinwala DC, IAENG, Zaveri M (2010) “Improving AODV Protocol Against Blackhole Attacks”. Paper presented at the International MultiConference of Engineers & Computer Scientists,Hong Kong, 17-19 March, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Black hole Attack AODV