Open Access   Article Go Back

A Review on Different Methods to Prevent Black Hole Attack in MANET

Pranjul Sarathe1 , Neeraj Shrivastava2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1149-1156, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.11491156

Online published on Jun 30, 2018

Copyright © Pranjul Sarathe, Neeraj Shrivastava . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pranjul Sarathe, Neeraj Shrivastava, “A Review on Different Methods to Prevent Black Hole Attack in MANET,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1149-1156, 2018.

MLA Style Citation: Pranjul Sarathe, Neeraj Shrivastava "A Review on Different Methods to Prevent Black Hole Attack in MANET." International Journal of Computer Sciences and Engineering 6.6 (2018): 1149-1156.

APA Style Citation: Pranjul Sarathe, Neeraj Shrivastava, (2018). A Review on Different Methods to Prevent Black Hole Attack in MANET. International Journal of Computer Sciences and Engineering, 6(6), 1149-1156.

BibTex Style Citation:
@article{Sarathe_2018,
author = {Pranjul Sarathe, Neeraj Shrivastava},
title = {A Review on Different Methods to Prevent Black Hole Attack in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1149-1156},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2318},
doi = {https://doi.org/10.26438/ijcse/v6i6.11491156}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.11491156}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2318
TI - A Review on Different Methods to Prevent Black Hole Attack in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - Pranjul Sarathe, Neeraj Shrivastava
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1149-1156
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
369 296 downloads 116 downloads
  
  
           

Abstract

Mobile ad hoc networks (MANET) are dynamic, decentralized and infrastructure less network, where at any given point of time nodes can join or leave the network. Due to the property of flexibility and simplicity MANET are widely used in military communication, mobile conferencing and emergency communication. As Ad-hoc networks are autonomous mobile nodes, they form a temporary based network which has no fixed infrastructure. Every node in the network is autonomous hence they act as host as well as router. Due to this nature of MANET, where any node can join or leave the network without any permission, security is the main challenge in such networks. One of the major security issues in MANET is Black hole attack. It occurs when a malicious node referred as black hole joins the network. during the process of discovering route this node acts as if it has route to the destination and takes all the packets into it and does not forward to the desired destination, Instead it drops all the packets. In this paper, we have surveyed on few of the techniques and methodologies for detecting and preventing black hole attack in MANET using AODV routing protocol.

Key-Words / Index Term

MANET, AODV Routing Protocol, Ad hoc network, Black hole

References

[1] K. Madhuri, N. K. Viswanath and P.U. Gayatri “Performance Evaluation of AODV under Black
Hole Attack in MANET using NS2”, IEEE International Conference On ICT and Business Industry &
Government (ICTBIG), pp. 1-3, Nov. 2016.
[2] S.R. Deshmukh, P.N. Chatur and N.B. Bhople “AODV-Based Secure Routing Against Black-hole Attack in MANET”, IEEE International Conference On Recent Trends in Electronics, Information & Technology, pp. 1960-1964, ISSN:978-1-5090-0774, May 2016.
[3] G. Bendale and S. shrivastava “An Improved Black-hole Attack Detection and Prevention Method for Wireless Ad-hoc Network”, IEEE International Conference on ICT in Business & Government, pp. 1-7, ISSN: 978-1-5090-5515, Apr. 2016.
[4] A. Siddiqua, K. Sridev and A. A. Khan Mohammad “Preventing Black-hole Attacks in MANET Using Secure Knowledge Algorithm” IEEE International Conference On Signal Processing and Communication Engineering System, Jan2015, pp. 421-425.
[5] C. B. Dutta and U. Biswas “An Energy Aware Black-hole Attack for Multipath AODV ”, IEEE International Conference On Business and Information Management, pp. 142-147, ISSN: 978-1-4799-3264-1, Jan. 2014.
[6] V. Gaikwad(Mohite) and L. Ragha “Security Agents for Detecting and Avoiding Cooperative Black-hole Attacks in MANET”, IEEE International Conference On Applied and Theoretical Computing & Communication Technology, pp. 306-311, ISSN: 978-1-14673-9223, Apr. 2015
[7] S. Jain and Dr. A. Khuteta “Detecting and Overcoming Black-hole Attack in Mobile Ad-hoc Network”, IEEE International Conference On Green Computing and Internet of Things, pp. 225-229, ISSN: 978-1-4673-7910, Jan. 2015.
[8] L. Mejaele and E. O. Ochola “Effect of Varying Node Mobility in the Analysis of Black Hole Attack on MANET Reactive Routing Protocol”, IEEE Information Security for South Africa(ISSA), pp. 62-68, ISSN: 978- 1-5090-2473, Aug. 2016.
[9] H. Kaur and A. singh “Identification and Mitigation of Black Hole Attack in wireless Sensor Networks”,IEEE International Conference On Micro-Electronics and Telecommunication Engineering, pp. 616-619, Sept. 2016.
[10 ]Balachandra and N. p. Shetty “ Interception of Black-Hole Attacks in Mobile AD-HOC Network”
IEEE International Conference On Inventive Computation Technology(ICICT), pp. 1-5, volume-3, Aug. 2016.
[11] B. Singh, D. Srikanth and C.R. Suthikshn kumar, “mitigating effects of Black hole Attack in Mobile Ad- hoc Networks: Military Perspective”, IEEE International Conference On Engineering and Technology, pp. 810-814, ISSN: 978-1-4673-9916, March 2016.
[12] A. Dorri and H. Nikdel “A New Approach for Detecting and Eliminating Cooperative Black hole node in MANET”, IEEE Conference On Information and Knowledge Technology, pp. 1-6, ISSN: 978-1-4673-7485-9, May 2015.
[13] H. Moudni, M. M. Mouncif and B. El Hadadi “Modified AODV Routing Protocol to Improve Security and performance against Black Hole Attack”, IEEE International Conference On Information Technology for Organizations Development, pp. 1-7, ISSN: 978-1-4673-7689, Apr. 2016.
[14] F. Thachil and K. C. Shet “A Trust Based Approach for AODV protocol to Mitigate Black-hole attack in MANET”, IEEE International Conference in Computing Science, pp. 281-285, Sept.2012.
[15] R. Yerneni and A. K. Sarje “Secure AODV Protocol to mitigate Black Hole Attack in Mobile Ad-hoc Networks”, IEEE International Conference on Computing Communication and Networking Technologies(ICCCNT), pp. 1-5, July 2012