CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Black Hole Attack in Mobile Ad Hoc Networks: Challenges and Directions

by Noble Arden Kuadey, Lily Bensah, Baidenger Agyekum Twumasi, Carlos Ankora, Gerald Tietaa Maale, Anthony Mawuena Kuadey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 29
Year of Publication: 2021
Authors: Noble Arden Kuadey, Lily Bensah, Baidenger Agyekum Twumasi, Carlos Ankora, Gerald Tietaa Maale, Anthony Mawuena Kuadey
10.5120/ijca2021921672

Noble Arden Kuadey, Lily Bensah, Baidenger Agyekum Twumasi, Carlos Ankora, Gerald Tietaa Maale, Anthony Mawuena Kuadey . Black Hole Attack in Mobile Ad Hoc Networks: Challenges and Directions. International Journal of Computer Applications. 183, 29 ( Oct 2021), 1-7. DOI=10.5120/ijca2021921672

@article{ 10.5120/ijca2021921672,
author = { Noble Arden Kuadey, Lily Bensah, Baidenger Agyekum Twumasi, Carlos Ankora, Gerald Tietaa Maale, Anthony Mawuena Kuadey },
title = { Black Hole Attack in Mobile Ad Hoc Networks: Challenges and Directions },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2021 },
volume = { 183 },
number = { 29 },
month = { Oct },
year = { 2021 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number29/32110-2021921672/ },
doi = { 10.5120/ijca2021921672 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:18:11.750066+05:30
%A Noble Arden Kuadey
%A Lily Bensah
%A Baidenger Agyekum Twumasi
%A Carlos Ankora
%A Gerald Tietaa Maale
%A Anthony Mawuena Kuadey
%T Black Hole Attack in Mobile Ad Hoc Networks: Challenges and Directions
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 29
%P 1-7
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad hoc network (MANET) is a dynamic wireless network with no fixed infrastructure. The nodes move arbitrarily and are capable of communicating with each other without a central authority. MANETs are well suited for several situations such as emergencies, vehicular networks, and military operations. However, the flexible nature of MANET exposes it to attacks such as black hole attacks. The black hole attack is considered as one of the most predominant attacks that poses a threat to MANET. In this attack, an illegitimate node informs a source node of having the optimal route to the destination node, resulting in data packets being redirected and eventually dropped by this illegitimate node. Several works have been carried out to address this issue. This paper presents an overview of solutions proposed to mitigate black hole attacks, research limitations to the proposed works, and future works that need to be carried out.

References
  1. S. Sharma and A. K. Gupta, “A comprehensive study of dymo routing protocol,” International Journal of Computer Applications, vol. 73, no. 22, 2013.
  2. J. Kumar, M. Kulkarni, and D. Gupta, “Effect of black hole attack on manet routing protocols,” International Journal of Computer Network and Information Security, vol. 5, no. 5, p. 64, 2013.
  3. D. N. Patel, S. B. Patel, H. R. Kothadiya, P. D. Jethwa, and R. H. Jhaveri, “A survey of reactive routing protocols in manet,” in International Conference on Information Communication and Embedded Systems (ICICES2014). IEEE, 2014, pp. 1–6.
  4. H. Kaur, V. Sahni, and M. Bala, “A survey of reactive, proactive and hybrid routing protocols in manet: A review,” network, vol. 4, no. 3, pp. 498–500, 2013.
  5. G. V. Kumar, Y. V. Reddyr, and M. Nagendra, “Current research work on routing protocols for manet: a literature survey,” international Journal on computer Science and Engineering, vol. 2, no. 3, pp. 706–713, 2010.
  6. N. Khanna and M. Sachdeva, “A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in manets,” Computer Science Review, vol. 32, pp. 24–44, 2019.
  7. P. Goyal, V. Parmar, R. Rishi et al., “Manet: vulnerabilities, challenges, attacks, application,” IJCEM International Journal of Computational Engineering & Management, vol. 11, no. 2011, pp. 32–37, 2011.
  8. R. Jaiswal, S. Sharma et al., “A novel approach for detecting and eliminating cooperative black hole attack using advanced dri table in ad hoc network,” in 2013 3rd IEEE International Advance Computing Conference (IACC). IEEE, 2013, pp. 499–504.
  9. M. C. Trivedi and S. Malhotra, “Identification and prevention of joint gray hole and black hole attacks,” International Journal of Ambient Computing and Intelligence (IJACI), vol. 10, no. 2, pp. 80–90, 2019.
  10. V. Sandhya Venu and D. Avula, “Invincible aodv to detect black hole and gray hole attacks in mobile ad hoc networks,” International Journal of Communication Systems, vol. 31, no. 6, p. e3518, 2018.
  11. H. Moudni, M. Er-rouidi, H. Mouncif, and B. El Hadadi, “Black hole attack detection using fuzzy based intrusion detection systems in manet,” Procedia Computer Science, vol. 151, pp. 1176–1181, 2019.
  12. D. Nitnaware and A. Thakur, “Black hole attack detection and prevention strategy in dymo for manet,” in 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2016, pp. 279–284.
  13. V. K. Saurabh, R. Sharma, R. Itare, and U. Singh, “Clusterbased technique for detection and prevention of black-hole attack in manets,” in 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2. IEEE, 2017, pp. 489–494.
  14. F. Albalas, M. B. Yaseen, and A. Nassar, “Detecting black hole attacks in manet using relieff classification algorithm,” in Proceedings of the 5th International Conference on Engineering and MIS, 2019, pp. 1–6.
  15. S. Naveena, C. Senthilkumar, and T. Manikandan, “Analysis and countermeasures of black-hole attack in manet by employing trust-based routing,” in 2020 6th international conference on advanced computing and communication systems (ICACCS). IEEE, 2020, pp. 1222–1227.
  16. G. Arulkumaran and R. Gnanamurthy, “Fuzzy trust approach for detecting black hole attack in mobile adhoc network,” Mobile Networks and Applications, vol. 24, no. 2, pp. 386–393, 2019.
  17. N. Veeraiah and B. T. Krishna, “Trust-aware fuzzyclus-fuzzy nb: intrusion detection scheme based on fuzzy clustering and bayesian rule,” Wireless Networks, vol. 25, no. 7, pp. 4021– 4035, 2019.
  18. S. Gurung and S. Chauhan, “A dynamic threshold based approach for mitigating black-hole attack in manet,” Wireless Networks, vol. 24, no. 8, pp. 2957–2971, 2018.
  19. A. Singh and M. Hasan, “An improved mechanism to prevent blackhole attack in manet,” in Progress in Advanced Computing and Intelligent Engineering. Springer, 2018, pp. 511– 520.
  20. P. Ndajah, A. O. Matine, and M. N. Hounkonnou, “Black hole attack prevention in wireless peer-to-peer networks: a new strategy,” International Journal of Wireless Information Networks, vol. 26, no. 1, pp. 48–60, 2019.
  21. S. Gurung and S. Chauhan, “A dynamic threshold based algorithm for improving security and performance of aodv under black-hole attack in manet,” Wireless Networks, vol. 25, no. 4, pp. 1685–1695, 2019.
  22. H. Mahore, R. Agrawal, and R. Gupta, “Agent based black hole detection technique in aodv routing protocol,” in 2018 International Conference on Advanced Computation and Telecommunication (ICACAT). IEEE, 2018, pp. 1–6.
  23. C. Panos, C. Ntantogian, S. Malliaros, and C. Xenakis, “Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks,” Computer Networks, vol. 113, pp. 94–110, 2017.
  24. T. Delkesh and M. A. J. Jamali, “Eaodv: Detection and removal of multiple black hole attacks through sending forged packets in manets,” Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 5, pp. 1897–1914, 2019.
  25. P. Gupta, P. Goel, P. Varshney, and N. Tyagi, “Reliability factor based aodv protocol: Prevention of black hole attack in manet,” in Smart Innovations in Communication and Computational Sciences. Springer, 2019, pp. 271–279.
  26. M. S. Pathan, J. He, N. Zhu, Z. A. Zardari, M. Q. Memon, and A. Azmat, “An efficient scheme for detection and prevention of black hole attacks in aodv-based manets,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 1, pp. 243–251, 2019.
  27. D. M. Khan, T. Aslam, N. Akhtar, S. Qadri, I. M. Rabbani, and M. Aslam, “Black hole attack prevention in mobile ad-hoc network (manet) using ant colony optimization technique,” Information Technology and Control, vol. 49, no. 3, pp. 308–319, 2020.
  28. V. Keerthika and N. Malarvizhi, “Mitigate black hole attack using hybrid bee optimized weighted trust with 2-opt aodv in manet,” Wireless Personal Communications, vol. 106, no. 2, pp. 621–632, 2019.
  29. R. Vatambeti, K. S. Supriya, and S. Sanshi, “Identifying and detecting black hole and gray hole attack in manet using gray wolf optimization,” International Journal of Communication Systems, vol. 33, no. 18, p. e4610, 2020.
  30. A. Dorri, S. Vaseghi, and O. Gharib, “Debh: detecting and eliminating black holes in mobile ad hoc network,” Wireless Networks, vol. 24, no. 8, pp. 2943–2955, 2018.
  31. Z. Ali Zardari, J. He, N. Zhu, K. H. Mohammadani, M. S. Pathan, M. I. Hussain, and M. Q. Memon, “A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in manets,” Future Internet, vol. 11, no. 3, p. 61, 2019.
  32. A. Yasin and M. Abu Zant, “Detecting and isolating blackhole attacks in manet using timer based baited technique,” Wireless Communications and Mobile Computing, vol. 2018, 2018.
  33. M. Mohanapriya and R. Santhosh, “Detection and elimination of black hole attacks in mobile ad hoc networks,” Materials Today: Proceedings, 2021.
  34. N. Rajendran, P. Jawahar, and R. Priyadarshini, “Cross centric intrusion detection system for secure routing over black hole attacks in manets,” Computer Communications, vol. 148, pp. 129–135, 2019.
  35. D. S. K. Tiruvakadu and V. Pallapa, “Honeypot based blackhole attack confirmation in a manet,” International Journal of Wireless Information Networks, vol. 25, no. 4, pp. 434–448, 2018.
  36. S. Hossain, M. S. Hussain, R. R. Ema, S. Dutta, S. Sarkar, and T. Islam, “Detecting black hole attack by selecting appropriate routes for authentic message passing using sha-3 and diffie-hellman algorithm in aodv and aomdv routing protocols in manet,” in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2019, pp. 1–7.
  37. L. Tamilselvan and V. Sankaranarayanan, “The 2nd international conference on wireless broadband and ultra wideband communications,” 2007.
  38. A. M. El-Semary and H. Diab, “Bp-aodv: Blackhole protected aodv routing protocol for manets based on chaotic map,” IEEE Access, vol. 7, pp. 95 197–95 211, 2019.
  39. N. Mistry, D. Jinwala, and M. Zaveri, “Mosaodv: solution to secure aodv against blackhole attack,” IJCNS) International Journal of Computer and Network Security, vol. 1, no. 3, pp. 42–45, 2009.
  40. N.-W. Lo and F.-L. Liu, “A secure routing protocol to prevent cooperative black hole attack in manet,” in Intelligent technologies and engineering systems. Springer, 2013, pp. 59–65.
  41. D. R. Choudhury, L. Ragha, and N. Marathe, “Implementing and improving the performance of aodv by receive reply method and securing it from black hole attack,” Procedia Computer Science, vol. 45, pp. 564–570, 2015.
  42. A. Chavan, D. Kurule, and P. Dere, “Performance analysis of aodv and dsdv routing protocol in manet and modifications in aodv against black hole attack,” Procedia Computer Science, vol. 79, pp. 835–844, 2016.
  43. S. R. Deshmukh, P. Chatur, and N. B. Bhople, “Aodv-based secure routing against blackhole attack in manet,” in 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016, pp. 1960–1964.
  44. L. Tamilselvan and V. Sankaranarayanan, “Prevention of cooperative black hole attack in manet.” J. Networks, vol. 3, no. 5, pp. 13–20, 2008.
  45. S. Dokurer, Y. Erten, and C. E. Acar, “Performance analysis of ad-hoc networks under black hole attacks,” in Proceedings 2007 IEEE SoutheastCon. IEEE, 2007, pp. 148–153.
  46. E. Mary Anita and V. Vasudevan, “Prevention of black hole attack in multicast routing protocols for mobile ad-hoc networks using a self-organized public key infrastructure,” Information Security Journal: A Global Perspective, vol. 18, no. 5, pp. 248–256, 2009.
  47. S. Lu, L. Li, K.-Y. Lam, and L. Jia, “Saodv: a manet routing protocol that can withstand black hole attack,” in 2009 international conference on computational intelligence and security, vol. 2. IEEE, 2009, pp. 421–425.
  48. N. Khanna, “Avoidance and mitigation of all packet drop attacks in manet using enhanced aodv with cryptography,” International Journal of Computer Network and Information Security (IJCNIS), vol. 37, 2016.
  49. N. Khana, “Mitigation of collaborative blackhole attack using traceroute mechanism with enhancement in aodv routing protocol,” International Journal of Future Generation Communication and Networking, vol. 9, no. 1, pp. 157–166, 2016.
  50. U. Venkanna, J. K. Agarwal, and R. L. Velusamy, “A cooperative routing for manet based on distributed trust and energy management,” Wireless Personal Communications, vol. 81, no. 3, pp. 961–979, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Black Hole Attack Cooperative Black Hole Attack Malicious Node Packets