CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Detailed Study on Black Hole Attack in MANET

by Devendra Kumar, Rupali Bhartiya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 3
Year of Publication: 2016
Authors: Devendra Kumar, Rupali Bhartiya
10.5120/ijca2016910664

Devendra Kumar, Rupali Bhartiya . A Detailed Study on Black Hole Attack in MANET. International Journal of Computer Applications. 146, 3 ( Jul 2016), 33-37. DOI=10.5120/ijca2016910664

@article{ 10.5120/ijca2016910664,
author = { Devendra Kumar, Rupali Bhartiya },
title = { A Detailed Study on Black Hole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 3 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number3/25381-2016910664/ },
doi = { 10.5120/ijca2016910664 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:49:20.847556+05:30
%A Devendra Kumar
%A Rupali Bhartiya
%T A Detailed Study on Black Hole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 3
%P 33-37
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc Network is one of the most effective technologies for communication and different types of applications which are working in crucial conditions such as: Army Battle Ground, Disaster Management and similar others but due to completely wireless communication that is not much efficient and a huge number of performance losses are observed in the similar way due to the poor routing strategy, the attackers can also degrade the performance of the network. In this paper the security analysis against black hole attack is performed. In addition of that a brief literature review on recently developed techniques for detection and prevention of black hole is also reported finally based on the different novel solutions a combined effort for detection and prevention of black hole is proposed for further implementation and security of Mobile Ad Hoc Network.

References
  1. R.Parthasarathy, A.Pravin Renold, Source based Trusted AODV Routing Protocol for Mobile Ad hoc Networks, International Conference on Advances in Computing, Communications and Informatics (ICACCI-2012).
  2. Christeena Joseph*, P. C. Kishoreraja, Radhika Baskar and M. Reji, “Performance Evaluation of MANETS under Black Hole Attack for Different Network Scenarios”, Indian Journal of Science and Technology, Vol 8(29).
  3. Nakka Nandini, Reena Aggarwal, “Prevention of black hole attack by different methods in MANET”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue.
  4. Hansraj Bhakte, Prof. Rahul Kulkarni, “Prevention Of Black Hole Attacks In AODV- Based Manets Using Secure Route Discovery”, Journal of Multidisciplinary Engineering Science and Technology (JMEST).
  5. Rajni Rani, Ms. Preethi Dolly, Mr. Devender Kumar, “Black Hole Prevention & Detection under Average Energy Consumptionin WSN”, IJCSMC,Vol.4.
  6. U.Venkanna1, R.Leela Velusami, Black Hole Attack and Their Counter Measure Based On Trust Management in Manet: A Survey, Int. Conf., on Advances in recent technologies in communication and computing 2011.
  7. Jiwen CAI, Ping YI, Jialin CHEN, Zhiyang WANG, Ning LIU, An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network, 1550-445X/10 $26.00 © 2010 IEEE.
  8. YanzhiRen, MooiChooChuah, Jie Yang, Yingying Chen, Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording, 978-1-4244 7265-9/10/$26.00 _c 2010 IEEE.
  9. Rakesh Kumar Jha, Upena D Dalal, Idris Z. Bholebawa, Performance Analysis of Black Hole Attack on WiMAX-WLAN Interface Network, 978-0-7695-4872-2/12 $26.00 © 2012 IEEE.
  10. Saurabh Gupta, SubratKar, S Dharmaraja, BAAP: Blackhole Attack Avoidance Protocol for Wireless Network, 978-1-4577-1386-611$26.00©2011 IEEE.
  11. Neha Gupta, Rajeev Kumar Singh, Manish Shrivastava, Cluster Formation through Improved Weighted Clustering Algorithm (IWCA) For Mobile Ad-hocNetworks,978-1-4673-5999-3/13/$31.00 ©2013 IEEE.
  12. James A Anderson, An Introduction To Neurl networks, MIT Press , 1995.
  13. Fidel Thachil, K. C. Shet, “A trust based approach for AODV protocol to mitigate black hole attack in MANET”, International Conference On computing Science 2012.
  14. Karim El Defrawy, Member, Gene Tsudik, Senior Member, “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs”, Computer Science DepartmentUniversity of California, Irvine, CA, USA.
  15. E.A.Mary Anita, V.Vasudevan, A.Ashwini, “A Certificate-Based Scheme to Defend Against Worm Hole Attacks in Multicast Routing Protocols for MANETs”, 978-1-4244-7770-8/10/$26.00 ©201 0 IEEE.
  16. Quansheng Guan, F. Richard Yu, Shengming Jiang and Victor C.M. Leung, “A Joint Design for Topology and Security in MANETs with Cooperative Communications”, 978-1-61284-231-8/11/$26.00 ©2011 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Black hole Security Wireless Communication Routing technique.