CFP last date
22 April 2024
Reseach Article

Black Hole Attack in MANETs Preventions and Advancements: A Review

Published on September 2016 by Krishan Kumar, Tarnjit Singh Aulakhl
International Conference on Advances in Emerging Technology
Foundation of Computer Science USA
ICAET2016 - Number 12
September 2016
Authors: Krishan Kumar, Tarnjit Singh Aulakhl
63357449-e067-44ac-bd91-c8249946ca22

Krishan Kumar, Tarnjit Singh Aulakhl . Black Hole Attack in MANETs Preventions and Advancements: A Review. International Conference on Advances in Emerging Technology. ICAET2016, 12 (September 2016), 4-9.

@article{
author = { Krishan Kumar, Tarnjit Singh Aulakhl },
title = { Black Hole Attack in MANETs Preventions and Advancements: A Review },
journal = { International Conference on Advances in Emerging Technology },
issue_date = { September 2016 },
volume = { ICAET2016 },
number = { 12 },
month = { September },
year = { 2016 },
issn = 0975-8887,
pages = { 4-9 },
numpages = 6,
url = { /proceedings/icaet2016/number12/25953-t194/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Emerging Technology
%A Krishan Kumar
%A Tarnjit Singh Aulakhl
%T Black Hole Attack in MANETs Preventions and Advancements: A Review
%J International Conference on Advances in Emerging Technology
%@ 0975-8887
%V ICAET2016
%N 12
%P 4-9
%D 2016
%I International Journal of Computer Applications
Abstract

A network is a system in which two or more than two computer systems are linked together with wires or without wires. Mobile Ad-Hoc networks (MANETs) are self-directed and distributed networks. MANETs consists of mobile nodes that are free to move in and out of the network. Nodes may be mobile phones, laptops, PCs, Printers, mp3 players, iPods etc. that participate in the network. Any of these nodes can act as a host/router or it can act both at the same time. They can form different topologies depending on their connectivity with each other in the network. These nodes can configure themselves since they have self-configuration ability. They can be deployed into the network at any time as they do not need any infrastructure. Development of various types of routing protocols has occurred in the recent past. Due to their dynamic topology, no infrastructure and no central management system MANETs are vulnerable to various security attacks. In this paper we have proposed a solution to detect and prevent multiple Black Holes in a network and find a secure way to transfer data from source to destination node.

References
  1. Jaspal Kumar, M. Kulkarni, Daya Gupta), "Effect of Black Hole Attack on MANET Routing Protocols", IJCNIS, 5, (2013), 64-72
  2. Sowmya K. S, Rakesh T. And Deepthi P Hudedagaddi (2012), "Detection and Prevention of Blackhole Attack in MANET Using ACO", International Journal of Computer Science & Network Security, May2012, Vol. 12 Issue 5, p21-24. 4p
  3. Rajni Tripathi And Shraddha Tripathi , "Preventive Aspect Of Black Hole Attack In Mobile Ad Hoc Network", IJAET, (2012) ISSN: 2231-1963
  4. Tanu Preet Singh Neha Vikrant Das (2012), "Multicast Routing Protocols in MANETS", Volume 2, IJARCSSE(2012)
  5. Shree Om, Mohammad Talib, "Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks", (IJACSA), Vol. 2, No. 5, 2011
  6. Nazmus Saquib1, MD. Sabbir Rahman Sakib1, and Al-sakib khan pathan, "Performance Analysis of MANET Routing Protocols Using an Elegant Visual Simulation Tool"
  7. Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai, Member, IEEE "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait" (2015)
  8. Detection Approach Kanika Bawa* and Shashi B. Rana† "Prevention of Black Hole Attack in MANET using Addition of Genetic Algorithm to Bacterial Foraging Optimization"(2015)
  9. P. Periyasamy, R. Anbuselvi, "Traffic Analysis and Prevent Pattern in MANET using AODV Protocol with AES Algorithm" (2015)
  10. Antony Devassy, K. Jayanthi (2012), "Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting",(IJMER), Vol. 2, Issue. 3, May-June 2012 pp-1017-1021 ISSN: 2249-6645
  11. Arnab Mitra, Rajib Ghosh, Apurba Chakraborty, Debleena Srivastva (2013), "An Alternative Approach to Detect Presence of Black Hole Nodes in Mobile Ad-Hoc Network Using Artificial Neural Network", Volume 3, Issue 3, March 2013 ISSN: 2277 128X IJARCSSE
  12. Saurabh Gupta, Subrat Kar, S Dharmaraja (2011), "BAAP: Blackhole Attack Avoidance Protocol for Wireless Network", (ICCCT)-2011
  13. Supriya Tayal, Vinti Gupta (2013), "A Survey of Attacks on Manet Routing Protocols", IJIRSET Vol. 2, Issue 6, June 2013
  14. DR. A. A. Gurjar, A. A. Dande (2013), "Black Hole Attack in Manet's: A Review Study", (IJIEASR) ISSN: 2319-4413, Volume 2, No. 3, March 2013
  15. Swati Jain, Naveen Hemrajani (2013), "Detection and Mitigation Techniques of Black Hole Attack in MANET: An Overview", (IJSR), India Online ISSN: 2319-7064
  16. MS Monika Y. Dangore, MR Santosh S. Sanbare (2013), "A Survey on Detection of Blackhole Attack using AODV Protocol in MANET", (IJRITCC), ISSN 2321–8169 Volume: 1 Issue: 155–61
  17. Puja Vij, V. K. Banga, Tanu Preet Singh , "Survey on Prevention of Black Hole Nodes in Mobile Ad-hoc Networks", (ICTEEP'2012) July 15-16, 2012 Singapore
  18. Nisha P John, Ashly Thomas (2012), "Prevention and Detection of Black Hole Attack in AODV based Mobile Ad-hoc Network- A Review", IJSRP, Volume 2, Issue 9, September 2012 ISSN 2250-3153
  19. Ajay Sharma, Nithesh k. Nandha, Kailash Parik, Prof. K. P. Yadav (2012), "Survey of Secure Routing Protocols for MANETs", IJRREST: Volume-1, Issue-2 | September-2012
  20. Rajneesh Narula And Sumeer Khullar (2012), "Security Issues of Routing Protocols in MANETs", IJCT, ISSN: 2277-3061 Volume 3 No. 2, OCT, 2012
  21. Ashwani Garg And Vikas Beniwal (2012), "A Review on Security Issues of Routing Protocols in Mobile Ad-Hoc Networks", Volume 2, Issue 9, September 2012 ISSN: 2277 128X IJARCSSE.
  22. K. Thamizhmaran, R. Santosh Kumar Mahto, V. Sanjesh Kumar Tripathi (2011), "Performance Analysis of Secure Routing Protocols in MANET", IJARCCE Vol. 1, Issue 9, November 2012
  23. Priyanka Goyal, Vinti Parmar, Rahul Rishi (2011), "MANET: Vulnerabilities, Challenges, Attacks, Application", IJCEM, Vol. 11, January 2011, ISSN (Online): 2230-7893
  24. Nital Mistry, Devesh C Jinwala, Mukesh Zaveri (2010), "Improving AODV Protocol against Blackhole Attacks",
  25. Harminder S. Bindra, Sunil K. Maakar and A. L. Sangal (2010), "Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model" IJCS Issues, Vol 7, Iss 3, Pp 38-43 (2010) ISSN(s): 1694-0784, 1694-0814
  26. Nital Mistry, Devesh C Jinwala, Mukesh Zaveri (2010), "Improving AODV Protocol against Blackhole Attacks",
  27. Nishant Sitapara and Prof. Sandeep B. Vanjale (2010), "Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks", ICETE-2010" on Emerging trends in engineering on 21st Feb 2010
  28. G. Vijaya Kumar, Y. Vasudeva Reddy, Dr. M. Nagendra (2010), "Current Research Work on Routing Protocols for MANET: A Literature Survey", IJCSE Vol. 02, No. 03, 2010, 706-713.
Index Terms

Computer Science
Information Sciences

Keywords

Dos Manet Rrep Rreq Rerr Aodv