Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

ANN to Detect Network under Black Hole Attack

IJCA Proceedings on International Conference on Emerging Trends in Technology and Applied Sciences
© 2015 by IJCA Journal
ICETTAS 2015 - Number 1
Year of Publication: 2015
Alfy Augustine
Manju James

Alfy Augustine and Manju James. Article: ANN to Detect Network under Black Hole Attack. IJCA Proceedings on International Conference on Emerging Trends in Technology and Applied Sciences ICETTAS 2015(1):15-18, September 2015. Full text available. BibTeX

	author = {Alfy Augustine and Manju James},
	title = {Article: ANN to Detect Network under Black Hole Attack},
	journal = {IJCA Proceedings on International Conference on Emerging Trends in Technology and Applied Sciences},
	year = {2015},
	volume = {ICETTAS 2015},
	number = {1},
	pages = {15-18},
	month = {September},
	note = {Full text available}


Security related issues are of serious concern in MANET. Lack of central administration and shared wireless medium makes MANET more vulnerable to security threats. An intruder passes an intermediate node into the MANET and introduces several kinds of attacks on the data transfer occurring between nodes. In this paper we consider Black hole attack in mobile ad hoc network, where all data packets are absorbed by the malicious nodes. A mechanism based on Artificial Neural Network (ANN) to detect the network under Black hole attack employing AODV routing protocol has been designed.


  • Ramanpreet Kaur, Anantdeep Kaur, "Blackhole Detection in MANET Using Artificial Neural Network", International Journal for Technological Research in Engineering , Vol . 1, No. 9, 2014.
  • Magnus Frodigh, Per Johansson and Peter Larsson, "Wireless ad hoc networking the art of networking without a network", Ericsson Review, No. 4
  • Surana K. A. , Rathi S. B. Thosar T. P. and Snehal Mehatre, "Securing Blackhole attack in Routing Protocol AODV in MANET with watchdog mechanisms", Word Research Journal of Computer Architecture, Vol. 1, issue 1, 2012
  • Elizabeth M Royer and Charles E Perkins, "An implementation study of the aodv routing protocol", wireless communications and networking conference, WCNC, IEEE Vol. 3
  • Bo Sun Yong Guan Jian Chen Udo W. Pooch, "Detecting Black-hole Attack in Mobile Ad Hoc Networks" , EPMCC, 2003.
  • Gerhardss-Padilla,E. , Aschenbruck N. ,Martini, P. , Jahnke, M. , Tolle,J. , " Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs", IEEE Trans. 2007.
  • Jagpreet Singh, Kulbhushan, "Fuzzy Logic based Intrusion Detection System against Blackhole Attack on AODV in MANET", IEEE Trans. Comput. 2011.
  • Yadav Poonam, Kumar Naveen, Gill R. K, "A Fuzzy Based Approach to Detect Black Hole Attack", International Journal of Soft Computing And Engineering (IJSCE), ISSN: 2231-2306, Vol. 2, No. 3, July 2012.
  • Vipin Khandel, Dinesh Goyal, "BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs", IJARCET, April 2013, Vol 2, No 4.
  • Moradi Zahra, Teshnehlab M. , Rahmani A. M,, "Implementation of Neural Networks for Intrusion Detection in MANET" , IEEE Trans. 2011.
  • Demuth, H. B. and M. Beale, "Neural Network Toolbox, Users Guide", The Math Work, Inc. , Natick, MA, 2002.
  • Vipan Chand Sharma, Atul Gupta, Vivek Dimri, "Detection of Black Hole Attack in MANET under AODV Routing Protocol" , IJARCSSE, Vol 3, No. 6 , June 2013.
  • A. Mitra, R. Ghosh, A. Chakraborty, D. Srivastva," AN Alternative Approach to Detect Presence of Black Hole Nodes in Mobile Ad-Hoc Network Using Artificial Neural Network" , IJARCSSE , 2013.
  • J. Ramkumar, R. Murugeswari, "Fuzzy Logic Approach for Detecting Black Hole Attack in Hybrid Wireless Mesh Network", IJIRSET, Vol. 3, No. 3, March 2014.
  • Y. Zhang, W. Lee, Y. Huang, "Intrusion detection techniques for mobile wireless networks", Wireless Networks , Vol 9, No. 5, Pp. 545-556, March 2003.