CFP last date
20 May 2024
Reseach Article

A study of Black Hole Attack and its Recent Prevention Techniques in MANET

by Pandi Selvam Raman
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 162 - Number 8
Year of Publication: 2017
Authors: Pandi Selvam Raman
10.5120/ijca2017913380

Pandi Selvam Raman . A study of Black Hole Attack and its Recent Prevention Techniques in MANET. International Journal of Computer Applications. 162, 8 ( Mar 2017), 1-5. DOI=10.5120/ijca2017913380

@article{ 10.5120/ijca2017913380,
author = { Pandi Selvam Raman },
title = { A study of Black Hole Attack and its Recent Prevention Techniques in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 162 },
number = { 8 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume162/number8/27260-2017913380/ },
doi = { 10.5120/ijca2017913380 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:08:25.921617+05:30
%A Pandi Selvam Raman
%T A study of Black Hole Attack and its Recent Prevention Techniques in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 162
%N 8
%P 1-5
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad hoc network (MANETs) is a self-organizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. MANETs nodes can communicate directly if they are in each other transmission range; else the relay nodes are forwarding the packets to neighbors or receivers. This connectivity between multiple nodes is furnished by network layer. Due to the MANETs open wireless medium security is one of the indispensable roles to resist attacks such as Rushing, Black Hole, and Worm Hole etc. Among these Black Hole attack is one of the major attack and this detection and prevention is still considered as a challenging task in ad hoc networks. Therefore this paper exposes a study of Black Hole attack and its various prevention techniques that are explored recently.

References
  1. Ram Ramanathan and Jason Redi, “A Brief Overview of Ad hoc Networks: Challenges and Directions,” IEEE Computer Magazine, pp.20-22, 2002.
  2. Sheltami, Tarek, “Ad hoc Network Overview,” http://www.ccse.kfupm.edu.sa/~tarek, Ad hoc network Technology, 2003.
  3. Changling Liu and Jorg Kaiser, “A Survey of Mobile Ad hoc Network Routing Protocols,” Univ. of Ulm, Tech. Rep.Series, 2005.
  4. Krishna Gorantala, “Routing Protocols in Mobile Ad hoc Networks,” Master Thesis in Computing Science, Umea University, Sweden, 2006.
  5. Geetha Jayakumar, and G. Gopinath, “Ad Hoc Mobile Wireless Networks Routing Protocols – A Review,” Journal of Computer Science 3 (8), pp.574-582, 2007.
  6. Djenouri D., Khelladi L., and Badache N., “ A survey of security issues in Mobile Adhoc and Sensor Networks,” IEEE Communications survey and tutorials, Vol.7, No.4, pp.1-27, 2005.
  7. Umesh Kumar Singh and Shivlal Mewada “An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)” International Journal of Computer Science and Information Security, Vol. 9, No. 4, April 2011.
  8. Rajinder Singh, Parvinder Singh and Manoj Duhan “An effective implementation of security based algorithmic approach in mobile adhoc networks” Human-centric Computing and Information Sciences, Springer 2014.
  9. Ranjan, Rakesh, Nirnemesh Kumar Singh, and Ajay Singh. "Security issues of black hole attacks in MANET." Computing, Communication & Automation (ICCCA), International Conference on. IEEE, 2015.
  10. Kishor Jyoti Sarma, Rupam Sharma, Rajdeep Das, “A Survey of Black Hole Attack Detection in Manet.” IEEE, 2014
  11. Ayesha Siddiqua, Kotari Sridevi, and Arshad Ahmad Khan Mohammed. "Preventing black hole attacks in MANETs using secure knowledge algorithm." Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conference on. IEEE, 2015.
  12. Miss Bhandare A. S., and S. B. Patil. "Securing MANET against Co-operative Black Hole Attack and Its Performance Analysis-A Case Study." Computing Communication Control and Automation (ICCUBEA), International Conference on. IEEE, 2015.
  13. Nidhi Choudhary, and Lokesh Tharani. "Preventing black hole attack in AODV using timer-based detection mechanism." Signal processing and communication engineering systems (SPACES), International conference on. IEEE, 2015.
  14. Ali Dorri and Hamed Nikdel. "A new approach for detecting and eliminating cooperative black hole nodes in MANET." Information and Knowledge Technology (IKT), 2015 7th Conference on. IEEE, 2015.
  15. Pooja and Chauhan, R. K. "An assessment based approach to detect black hole attack in MANET." Computing, Communication & Automation (ICCCA), 2015 International Conference on. IEEE, 2015.
  16. Ashish Kumar Jain and Vrinda Tokekar. "Mitigating the effects of Black hole attacks on AODV routing protocol in Mobile Ad hoc Networks." Pervasive computing (ICPC), 2015 international conference on. IEEE, 2015.
  17. Anand A.Aware and Kiran Bhandari. "Prevention of Black hole Attack on AODV in MANET using hash function." Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2014 3rd International Conference on. IEEE, 2014.
  18. Kriti Patidar and Vandana Dubey. "Modification in routing mechanism of AODV for defending blackhole and wormhole attacks." IT in Business, Industry and Government (CSIBIG), 2014 Conference on. IEEE, 2014.
  19. Vishvas Kshirsagar, Ashok M. Kanthe, and Dina Simunic. "Analytical approach towards packet drop attacks in mobile ad-hoc networks." Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on. IEEE, 2014.
  20. Gayatri Wahane, Ashok M. Kanthe, and Dina Simunic. "Detection of cooperative black hole attack using crosschecking with truelink in MANET." Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on. IEEE, 2014.
  21. Ruo Cai Jun, Peter Han Joo Chong, and Cherry Ye Aung. "Poster: Trust-based routing with neighborhood connectivity to prevent single and colluded active black hole." Communications and Networking in China (CHINACOM), 2014 9th International Conference on. IEEE, 2014.
  22. Harsh Pratap Singh and Rashmi Singh. "A mechanism for discovery and prevention of coopeartive black hole attack in mobile ad hoc network using AODV protocol." Electronics and Communication Systems (ICECS), 2014 International Conference on. IEEE, 2014.
  23. Seryvuth Tan and Keecheon Kim. "Secure Route Discovery for preventing black hole attacks on AODV-based MANETs." High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on. IEEE, 2013.
  24. Durgesh Kshirsagar and Abhijit Patil. "Blackhole attack detection and prevention by real time monitoring." Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on. IEEE, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs Routing Security Attacks strategies Black hole attack.