Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Black Hole Attacks in MANETs: Preventions by Identification of Thick Node Method

IJCA Proceedings on International Conference on Advances in Emerging Technology
© 2018 by IJCA Journal
ICAET 2017 - Number 3
Year of Publication: 2018
Krishan Kumar
Taranjit Singh Aulakh

Krishan Kumar and Taranjit Singh Aulakh. Article: Black Hole Attacks in MANETs: Preventions by Identification of Thick Node Method. IJCA Proceedings on International Conference on Advancements in Engineering and Technology ICAET 2017(3):1-5, July 2018. Full text available. BibTeX

	author = {Krishan Kumar and Taranjit Singh Aulakh},
	title = {Article: Black Hole Attacks in MANETs: Preventions by Identification of Thick Node Method},
	journal = {IJCA Proceedings on International Conference on Advancements in Engineering and Technology},
	year = {2018},
	volume = {ICAET 2017},
	number = {3},
	pages = {1-5},
	month = {July},
	note = {Full text available}


When two or more computer Systems link together with the help of wire or without wire that system is called the network of a computers. A network which is self directed and distributed is known as Mobile Adhoc Network. MANETs consists of mobile nodes that are free to move in and out of the network. Computers, IPod, Mobile Phones constitute to be a Node that participates in the network. Different type of topologies can be formed on the basis of connectivity of the nodes with each other in the network. These nodes can either act as a host or router or it can act as both. These nodes can be deployed in any network and due to their dynamic topology no infrastructure or central management system is required and thus it makes the MANET vulnerable to the security attacks. In these paper two methods i. e. MN-ID broadcasting and thick node identification method were compared and it was found that the thick identification method has got an upper edge on the other method.


  • Jaspal Kumar, M. Kulkarni, Daya Gupta), "Effect of Black Hole Attack on MANET Routing Protocols", IJCNIS, 5, (2013), 64-72
  • Sowmya K. S, Rakesh T. And Deepthi P Hudedagaddi (2012), "Detection and Prevention of Blackhole Attack in MANET Using ACO", International Journal of Computer Science & Network Security, May2012, Vol. 12 Issue 5, p21-24. 4p
  • Rajni Tripathi And Shraddha Tripathi , "Preventive Aspect Of Black Hole Attack In Mobile Ad Hoc Network", IJAET, (2012) ISSN: 2231-1963
  • Tanu Preet Singh Neha Vikrant Das (2012), "Multicast Routing Protocols in MANETS",Volume 2, IJARCSSE(2012)
  • Shree Om, Mohammad Talib, "Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks", (IJACSA), Vol. 2, No. 5, 2011
  • Nazmus Saquib1, MD. Sabbir Rahman Sakib1, and Al-sakib khan pathan, "Performance Analysis of MANET Routing Protocols Using an Elegant Visual Simulation Tool"
  • Antony Devassy, K. Jayanthi (2012), "Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting",(IJMER), Vol. 2, Issue. 3, May-June 2012 pp-1017-1021 ISSN: 2249-6645
  • Arnab Mitra, Rajib Ghosh, Apurba Chakraborty, Debleena Srivastva (2013), "An Alternative Approach to Detect Presence of Black Hole Nodes in Mobile Ad-Hoc Network Using Artificial Neural Network", Volume 3, Issue 3, March 2013 ISSN: 2277 128X IJARCSSE
  • Saurabh Gupta, Subrat Kar, S Dharmaraja (2011), "BAAP: Blackhole Attack Avoidance Protocol for Wireless Network", (ICCCT)-2011
  • Supriya Tayal, Vinti Gupta (2013), "A Survey of Attacks on Manet Routing Protocols", IJIRSET Vol. 2, Issue 6, June 2013
  • DR. A. A. Gurjar, A. A. Dande (2013), "Black Hole Attack in Manet's: A Review Study", (IJIEASR) ISSN: 2319-4413, Volume 2, No. 3, March 2013
  • Swati Jain, Naveen Hemrajani (2013), "Detection and Mitigation Techniques of Black Hole Attack in MANET: An Overview", (IJSR), India Online ISSN: 2319-7064
  • MS Monika Y. Dangore, MR Santosh S. Sanbare (2013), "A Survey on Detection of Blackhole Attack using AODV Protocol in MANET", (IJRITCC), ISSN 2321–8169 Volume: 1 Issue: 155–61
  • Puja Vij, V. K. Banga, Tanu Preet Singh , "Survey on Prevention of Black Hole Nodes in Mobile Ad-hoc Networks", (ICTEEP'2012) July 15-16, 2012 Singapore
  • Nisha P John, Ashly Thomas (2012), "Prevention and Detection of Black Hole Attack in AODV based Mobile Ad-hoc Network- A Review", IJSRP, Volume 2, Issue 9, September 2012 ISSN 2250-3153
  • Ajay Sharma, Nithesh k. Nandha, Kailash Parik, Prof. K. P. Yadav (2012), "Survey of Secure Routing Protocols for MANETs", IJRREST: Volume-1, Issue-2 | September-2012
  • Rajneesh Narula And Sumeer Khullar (2012), "Security Issues of Routing Protocols in MANETs", IJCT, ISSN: 2277-3061 Volume 3 No. 2, OCT, 2012
  • Ashwani Garg And Vikas Beniwal (2012), "A Review on Security Issues of Routing Protocols in Mobile Ad-Hoc Networks", Volume 2, Issue 9, September 2012 ISSN: 2277 128X IJARCSSE.
  • K. Thamizhmaran, R. Santosh Kumar Mahto, V. Sanjesh Kumar Tripathi (2011), "Performance Analysis of Secure Routing Protocols in MANET", IJARCCE Vol. 1, Issue 9, November 2012
  • Priyanka Goyal, Vinti Parmar, Rahul Rishi (2011), "MANET: Vulnerabilities, Challenges, Attacks, Application", IJCEM, Vol. 11, January 2011, ISSN (Online): 2230-7893
  • Nital Mistry, Devesh C Jinwala, Mukesh Zaveri (2010), "Improving AODV Protocol against Blackhole Attacks",
  • Harminder S. Bindra, Sunil K. Maakar and A. L. Sangal (2010), "Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model" IJCS Issues, Vol 7, Iss 3, Pp 38-43 (2010) ISSN(s): 1694-0784, 1694-0814
  • Nishant Sitapara and Prof. Sandeep B. Vanjale (2010), "Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks", ICETE-2010" on Emerging trends in engineering on 21st Feb 2010
  • G. Vijaya Kumar, Y. Vasudeva Reddy, Dr. M. Nagendra (2010), "Current Research Work on Routing Protocols for MANET: A Literature Survey", IJCSE Vol. 02, No. 03, 2010, 706-713.