Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

An Enhanced Approach for Detecting Black Hole Attacks in MANET

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Pratima Sarkar

Pratima Sarkar. An Enhanced Approach for Detecting Black Hole Attacks in MANET. International Journal of Computer Applications 161(6):6-9, March 2017. BibTeX

	author = {Pratima Sarkar},
	title = {An Enhanced Approach for Detecting Black Hole Attacks in MANET},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {6},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {6-9},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2017913209},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The proposed paper is enhanced version of our previous paper” A cryptographic approach towards Black Hole Attack Detection” accepted in CNSA 2012 gives solution for false reply from a node and confirms reply is coming from destination node in Black Hole attack. This paper proposed an algorithm for detecting malicious node that drops packet and the node that gives false reply to the source node. In this work detection of false reply by a malicious node and also detecting a node that drops the packets. Detection in both the cases is performed locally using the previous node of the attacker. This paper uses two acknowledgements for detecting malicious node. By using this algorithm the security mechanism overhead would be decreased, throughput also increased and reduced end-to-end delay. The graphs at the result section shows improvement in network performances in the presence of black hole attacks and it can do so with a negligible level of additional overhead.


  1. Royer E.M.,(1999)“A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”,[J]. IEEE Personal Communication. 4(2) : pp.46-55.
  2. Mishra, A, Nadkarni, K, & Patcha, A,(Feb 2004)“Intrusion Detection in Wireless Ad Hoc Networks”,IEEE Wireless Communications”, VOL.11pp.48-60
  3. Zhou L & Chao H-C (2011)” Multimedia Traffic Security Architecture for the Internet of Things. IEEE Network “25(3):29–34.doi: 10.1109/MNET.2011.5772059
  4. Yang H, Lou H, Ye F & Lu SZhang L (2004)”, Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications “11(1):38–47. doi:10.1109/ MWC.2004.1269716
  5. S, Reddy BVR, & Hoda MN (2010) “Enhanced Intrusion Detection System for Malicious Node Detection in Ad Hoc Routing Protocols using Minimal Energy Consumption. IET Communications”, 4(17):2084–2094. doi: 10.1049/ietcom.2009.0616
  6. Wu B, Chen J, Wu J & Cardei M (2007) “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks “,In: Xiao Y, Shen X, Du D-Z (eds) Wireless Network Security. on Signals and Communication Technology. Springer, New York
  7. Marti S, Giuli TJ, Lai K & Baker M (2000) “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Paper presented at the 6th annual International Conference on Mobile Computing and Networking, Boston, Massachusetts,
  8. H.Deng, W. Li & D. Agrawal (2002)” Routing security in ad hoc networks. IEEE Communications Magazine”, vol. 40, no. 10, pp. 70-75.
  9. Mehdi Medadian, M.H. Yektaie & A.M Rahmani(2009)” Combat with Black Hole Attack in AODV routing protocol in MANET”,IEEE.
  10. Songbai Lu, Longxuan, Li Kwok-Yan Lam & Lingyan Jia (2009)” SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack”, International Conference on Computational Intelligence and Security.
  11. Lien-Wen Wu & Rui-Feng Yu (2010)” A Threshold-Based Method for Selfish Node Detection in MANET”, IEEE, pp 875-882.
  12. Jaydip Sen, Sripad Koilakonda & Arijit Ukil (2011) “A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, Second International Conference on Intelligent Systems, Modelling and Simulation.
  13. Akanksha Saini & Harish Kumar (December 2010) “Effect Of Black Hole Attack On AODV Routing Protocol In MANET”, IJCST Vol. 1, Issue 2.
  14. Pratima Sarkar & Rituparna Chaki (2012) “A cryptographic approach towards Black Hole Attack Detection” Accepted in CNSA-2012 Chennai.


Mobile Ad hoc Networks Routing, Intruder Detection; DOS; Black Hole Attack