CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

Black Hole Attacks in MANETs: Preventions by Identification of Thick Node Method

Published on July 2018 by Krishan Kumar, Taranjit Singh Aulakh
International Conference on Advances in Emerging Technology
Foundation of Computer Science USA
ICAET2017 - Number 3
July 2018
Authors: Krishan Kumar, Taranjit Singh Aulakh
13f271be-7ec5-4b51-a45f-30986d2e29d9

Krishan Kumar, Taranjit Singh Aulakh . Black Hole Attacks in MANETs: Preventions by Identification of Thick Node Method. International Conference on Advances in Emerging Technology. ICAET2017, 3 (July 2018), 1-5.

@article{
author = { Krishan Kumar, Taranjit Singh Aulakh },
title = { Black Hole Attacks in MANETs: Preventions by Identification of Thick Node Method },
journal = { International Conference on Advances in Emerging Technology },
issue_date = { July 2018 },
volume = { ICAET2017 },
number = { 3 },
month = { July },
year = { 2018 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icaet2017/number3/29651-7065/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Emerging Technology
%A Krishan Kumar
%A Taranjit Singh Aulakh
%T Black Hole Attacks in MANETs: Preventions by Identification of Thick Node Method
%J International Conference on Advances in Emerging Technology
%@ 0975-8887
%V ICAET2017
%N 3
%P 1-5
%D 2018
%I International Journal of Computer Applications
Abstract

When two or more computer Systems link together with the help of wire or without wire that system is called the network of a computers. A network which is self directed and distributed is known as Mobile Adhoc Network. MANETs consists of mobile nodes that are free to move in and out of the network. Computers, IPod, Mobile Phones constitute to be a Node that participates in the network. Different type of topologies can be formed on the basis of connectivity of the nodes with each other in the network. These nodes can either act as a host or router or it can act as both. These nodes can be deployed in any network and due to their dynamic topology no infrastructure or central management system is required and thus it makes the MANET vulnerable to the security attacks. In these paper two methods i. e. MN-ID broadcasting and thick node identification method were compared and it was found that the thick identification method has got an upper edge on the other method.

References
  1. Jaspal Kumar, M. Kulkarni, Daya Gupta), "Effect of Black Hole Attack on MANET Routing Protocols", IJCNIS, 5, (2013), 64-72
  2. Sowmya K. S, Rakesh T. And Deepthi P Hudedagaddi (2012), "Detection and Prevention of Blackhole Attack in MANET Using ACO", International Journal of Computer Science & Network Security, May2012, Vol. 12 Issue 5, p21-24. 4p
  3. Rajni Tripathi And Shraddha Tripathi , "Preventive Aspect Of Black Hole Attack In Mobile Ad Hoc Network", IJAET, (2012) ISSN: 2231-1963
  4. Tanu Preet Singh Neha Vikrant Das (2012), "Multicast Routing Protocols in MANETS",Volume 2, IJARCSSE(2012)
  5. Shree Om, Mohammad Talib, "Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks", (IJACSA), Vol. 2, No. 5, 2011
  6. Nazmus Saquib1, MD. Sabbir Rahman Sakib1, and Al-sakib khan pathan, "Performance Analysis of MANET Routing Protocols Using an Elegant Visual Simulation Tool"
  7. Antony Devassy, K. Jayanthi (2012), "Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting",(IJMER), Vol. 2, Issue. 3, May-June 2012 pp-1017-1021 ISSN: 2249-6645
  8. Arnab Mitra, Rajib Ghosh, Apurba Chakraborty, Debleena Srivastva (2013), "An Alternative Approach to Detect Presence of Black Hole Nodes in Mobile Ad-Hoc Network Using Artificial Neural Network", Volume 3, Issue 3, March 2013 ISSN: 2277 128X IJARCSSE
  9. Saurabh Gupta, Subrat Kar, S Dharmaraja (2011), "BAAP: Blackhole Attack Avoidance Protocol for Wireless Network", (ICCCT)-2011
  10. Supriya Tayal, Vinti Gupta (2013), "A Survey of Attacks on Manet Routing Protocols", IJIRSET Vol. 2, Issue 6, June 2013
  11. DR. A. A. Gurjar, A. A. Dande (2013), "Black Hole Attack in Manet's: A Review Study", (IJIEASR) ISSN: 2319-4413, Volume 2, No. 3, March 2013
  12. Swati Jain, Naveen Hemrajani (2013), "Detection and Mitigation Techniques of Black Hole Attack in MANET: An Overview", (IJSR), India Online ISSN: 2319-7064
  13. MS Monika Y. Dangore, MR Santosh S. Sanbare (2013), "A Survey on Detection of Blackhole Attack using AODV Protocol in MANET", (IJRITCC), ISSN 2321–8169 Volume: 1 Issue: 155–61
  14. Puja Vij, V. K. Banga, Tanu Preet Singh , "Survey on Prevention of Black Hole Nodes in Mobile Ad-hoc Networks", (ICTEEP'2012) July 15-16, 2012 Singapore
  15. Nisha P John, Ashly Thomas (2012), "Prevention and Detection of Black Hole Attack in AODV based Mobile Ad-hoc Network- A Review", IJSRP, Volume 2, Issue 9, September 2012 ISSN 2250-3153
  16. Ajay Sharma, Nithesh k. Nandha, Kailash Parik, Prof. K. P. Yadav (2012), "Survey of Secure Routing Protocols for MANETs", IJRREST: Volume-1, Issue-2 | September-2012
  17. Rajneesh Narula And Sumeer Khullar (2012), "Security Issues of Routing Protocols in MANETs", IJCT, ISSN: 2277-3061 Volume 3 No. 2, OCT, 2012
  18. Ashwani Garg And Vikas Beniwal (2012), "A Review on Security Issues of Routing Protocols in Mobile Ad-Hoc Networks", Volume 2, Issue 9, September 2012 ISSN: 2277 128X IJARCSSE.
  19. K. Thamizhmaran, R. Santosh Kumar Mahto, V. Sanjesh Kumar Tripathi (2011), "Performance Analysis of Secure Routing Protocols in MANET", IJARCCE Vol. 1, Issue 9, November 2012
  20. Priyanka Goyal, Vinti Parmar, Rahul Rishi (2011), "MANET: Vulnerabilities, Challenges, Attacks, Application", IJCEM, Vol. 11, January 2011, ISSN (Online): 2230-7893
  21. Nital Mistry, Devesh C Jinwala, Mukesh Zaveri (2010), "Improving AODV Protocol against Blackhole Attacks",
  22. Harminder S. Bindra, Sunil K. Maakar and A. L. Sangal (2010), "Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model" IJCS Issues, Vol 7, Iss 3, Pp 38-43 (2010) ISSN(s): 1694-0784, 1694-0814
  23. Nishant Sitapara and Prof. Sandeep B. Vanjale (2010), "Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks", ICETE-2010" on Emerging trends in engineering on 21st Feb 2010
  24. G. Vijaya Kumar, Y. Vasudeva Reddy, Dr. M. Nagendra (2010), "Current Research Work on Routing Protocols for MANET: A Literature Survey", IJCSE Vol. 02, No. 03, 2010, 706-713.
Index Terms

Computer Science
Information Sciences

Keywords

Dos Manet Rrep Rreq Rerr Aodv