Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Performance Enhancement and Mitigation of Black Hole Attack in MANET using CRN and Enhanced AODV

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Natasha, Preety Chaudhary, Rakesh Kumar

Natasha, Preety Chaudhary and Rakesh Kumar. Performance Enhancement and Mitigation of Black Hole Attack in MANET using CRN and Enhanced AODV. International Journal of Computer Applications 156(13):16-20, December 2016. BibTeX

	author = {Natasha and Preety Chaudhary and Rakesh Kumar},
	title = {Performance Enhancement and Mitigation of Black Hole Attack in MANET using CRN and Enhanced AODV},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2016},
	volume = {156},
	number = {13},
	month = {Dec},
	year = {2016},
	issn = {0975-8887},
	pages = {16-20},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2016912587},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


MANET is field of networking that is used to transmit information. MANET utilizes different routing strategies for data transmission from source to destination. Mobility is main concern in MANET due to path management for data transmission. In this paper MANET security has been discussed to overcome various attacks performed by this paper black hole attack detection has been done on the basis of dynamic detection strategies malicious node that degrades performance of network has been detected. Purposed approach provides much better results than previous approaches available for data communication and attack detection in MANET.


  1. Shakshuki, E.M. “EAACK-A Secure Intrusion-Detection System for MANETs” IEEE Journals on Industrial Electronics, Volume 60, 2012, pp. 1089–1098.
  2. Lee, Uichin. “Efficient peer-to-peer files sharing using network coding in MANET”IEEE Journal on Communications and Networks, Volume10, 2008, pp. 422–429.
  3. Hiranandani, “MANET protocol simulations considered harmful: the case for benchmarking” IEEE Journal on Wireless Communications, Volume: 20, 2013, pp. 82 – 90.
  4. Burbank, J.L. “Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology” journal IEEE on Communications Magazine, Volume 44, 2006, pp-39 – 45.
  5. Dongkyun Kim. “Improving TCP-Vegas Performance over MANET Routing Protocols” journal IEEE on Vehicular Technology, Volume 56, 2007, pp. 372 – 377.
  6. El Defrawy, K. “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs IEEE Journal on Mobile Computing, Volume10, 2010, pp. 1345 – 1358.
  7. Di Crescenzo, G. “Securing reliable server pooling in MANET against byzantine adversaries” IEEE Journal on Selected Areas in Communications, Volume 24 , 2006,pp- 357 – 369.
  8. Bellavista, P. “Convergence of MANET and WSN in IoT Urban Scenarios” IEEE Journal on Volume 13, 2013, pp.3558 – 3567.
  9. Ziming Zhao “Risk-Aware Mitigation for MANET Routing Attacks”, IEEE Journal on Dependable and Secure Computing, Volume 9, 2011, pp. 250–260.
  10. Gaeta, R. “Exploiting Rate less Codes and Belief Propagation to Infer Identity of Polluters in MANET”, IEEE Journal on Mobile Computing, Volume 13, pp. 1482 – 1494.


Black hole nodes, CRN, Mobile Ad-hoc Network