Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Avoidance of Black Hole Attack in Virtual Infrastructure for MANET

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 3
Year of Publication: 2012
R. Kesavan
V. Thulasi Bai

R.kesavan and Thulasi V Bai. Article: Avoidance of Black Hole Attack in Virtual Infrastructure for MANET. International Journal of Computer Applications 50(3):26-31, July 2012. Full text available. BibTeX

	author = {R.kesavan and V. Thulasi Bai},
	title = {Article: Avoidance of Black Hole Attack in Virtual Infrastructure for MANET},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {3},
	pages = {26-31},
	month = {July},
	note = {Full text available}


A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. In this paper, we give an algorithmic approach to focus on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is on ensuring the security against Black hole attack. The proposed solution is capable of detecting Black hole node(s) in the MANET at the beginning and a solution to discover a safe route detects cooperative black hole attack.


  • C. Perkins, E. Belding-Royer, and S. Das,(2003) "Ad-hoc on-demand distance vector (AODV) routing", Internet Draft, RFC 3561, July.
  • H. Deng, H. Li, and D. Agarval,(2002) "Routing security in wireless ad hoc networks", IEEE Communications Magazine, Vol. 40, No. 10.
  • L. Tamilselvan, and V. Sankaranarayanan, (2008) "Prevention of cooperative black hole attack in manet", Journal of Networks, Vol. 3 (5),pp. 13-20.
  • Z. Karakehayov,(2005) "Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks," Wksp. Real-WorldWireless Sensor Networks, June 20–21.
  • S. Desilva, and R. V. Boppana,(2005) "Mitigating Malicious Control Packet Floods in Ad Hoc Networks," Proc. IEEE Wireless Commun. and Networking Conf. , New Orleans, LA.
  • Yih-Chun, Adrian Perrig, David B. Johnson,(2002) "Ariadne: A secure On-Demand Routing Protocol for AdHocNetworks",parrow. ece. cmu. edu/~adrian/projects /secure routing/ariadne. pdf.
  • Junhai luo; Mingyu Fan,(2008) "Research on trust model based on game theory in mobile ad-hoc networks, Journal of Computer Research and Development", Vol 45, No. 10, pp1704-1710
  • Yi-Chun Hu, Adrian Perrig,(2004) "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security and Privacy, 1540-7993/04/$20. 00 © 2004 IEEE.
  • Satoshi Kurosawa, "Hidehisa Nakayama and Nei Kato et al,(2008) "Detecting black hole attack on AODV based mobile ad hoc networks by dynamic learning method, International Journal of Network Security", pp. 338-346
  • Makki, Shamila, Pissinou, Nikki; Huang, Hui,(2004)," Solution to the black hole problem in mobile ad-hoc network, 5th World Wireless Congress", pp. 508-512
  • Lidong zhou, Zygmunt J. Haas(1999), "Securing Ad Hoc Networks", IEEE network, special issue on network security, Vol. 13, no. 6.
  • Sukla Banerjee(2008) "Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks" Proceedings of the World Congress on Engineering and Computer Science San Francisco, USA
  • S. Bansal and M. Baker,(2003) "OCEAN: Observation based cooperation enforcement in ad hoc networks", Technical Report, Stanford University.
  • M. A. Shurman, S. M. Yoo, and S. Park,(2004) "Black hole attack in wireless ad hoc networks," in ACM 42nd Southeast Conference (ACMSE?04), pp.
  • Dokurer, Semih. (2006) "Simulation of Black hole attack in wireless Ad-hoc networks". Master's thesis, At?l?mUniversity.
  • N. H. Mistry, D. C. Jinwala and M. A. Zaveri,(2009) "MOSAODV: Solution to Secure AODV against Blackhole Attack ", (IJCNS) International Journal of Computer and Network Security, Vol. 1, No. 3.
  • Piyush Agrawal, R. K. Ghosh, Sajal K. Das,(2008), Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks In Proceedings of the 2nd international conference onUbiquitous information management and communication, Pages 310-314, Suwon, Korea.
  • Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard,(2003) "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks", www. cs. ndsu. nodak. edu/~nygard/research BlackHoleMANET. pdf .
  • Bracha Hod,(2005) "Cooperative and Reliable Packet-Forwarding On Top of AODV", www. cs. huji. ac. il/~dolev/pubs/reliable-aodv. pdf.
  • Chen Hongsong, Ji Zhenzhou and Hu Mingzeng, (2006) "A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition". Asian Journal of Information Technology, 5 (1) : 54-60.