CFP last date
20 January 2025
Reseach Article

Technique for Detection and Isolation of Black Hole Attack in MANETs

by Ramneet Kaur, Amandeep Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 4
Year of Publication: 2017
Authors: Ramneet Kaur, Amandeep Kaur
10.5120/ijca2017915379

Ramneet Kaur, Amandeep Kaur . Technique for Detection and Isolation of Black Hole Attack in MANETs. International Journal of Computer Applications. 174, 4 ( Sep 2017), 22-25. DOI=10.5120/ijca2017915379

@article{ 10.5120/ijca2017915379,
author = { Ramneet Kaur, Amandeep Kaur },
title = { Technique for Detection and Isolation of Black Hole Attack in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 174 },
number = { 4 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number4/28395-2017915379/ },
doi = { 10.5120/ijca2017915379 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:15.690252+05:30
%A Ramneet Kaur
%A Amandeep Kaur
%T Technique for Detection and Isolation of Black Hole Attack in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 4
%P 22-25
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The infrastructure less property in ad hoc networks poses great challenges in the functionality of these networks. Therefore, we refer to a wireless ad hoc network with mobile nodes as a Mobile Ad Hoc Network. In AODV route request, route reply and route error are the control messages. When source node wants to establish route to the destination nodes, source node first sends route request control packets to their adjacent nodes. When adjacent node receives route request packets if node has the route to the destination node it will reply back to source node with route reply message. Source node select best route on the basis of hop counts and on the basis of sequence number. The black hole attack is the active type of attack in which malicious node commit that it has path to destination but it does not have path to destination. In this work, technique of blacklist and clustering is proposed which detect and isolate malicious nodes from the network.

References
  1. Caimu Tang, Dapeng Oilver, “An Efficient Mobile Authentication Scheme for Wireless Networks”, 2011, IEEE
  2. Durgesh Wadbude, Vineet Richariya, “An Efficient Secure AODV Routing Protocol in MANET”, 2012, International Journal of Engineering and Innovative Technology (IJEIT) ISSN: 2277-3754 Volume 1, Issue 4
  3. Jacek Cicho,Rafał Kapelko, Jakub Lemiesz, and Marcin Zawada“On Alarm Protocol in Wireless Sensor Networks”, 2010, IEEE
  4. S. Sharmila and G. Umamaheswari, “Defensive Mechanism of Selective Packet Forward Attack in Wireless Sensor Networks”, 2012, International Journal of Computer Applications (0975 – 8887) Volume 39– No.4
  5. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges”, 2005, IJSER
  6. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks”, 2006, Springer
  7. M. Jhansi, K. R. Devi and B. M. Chandra, “Effective Measure to Prevent Cooperative Blackhole attack in Mobile adhoc Wireless Network,” 2012, International Journal of Engineering Research and Applications, vol. 2, no. 4, pp. 204-209
  8. H. L. Nguyen and U. T. Nguyen, “A Study of Different Types of Attacks in Mobile Adhoc Network,” 2012, 25th IEEE Canadian Conference on Electrical and Computer Engineering, no. 2, pp. 1-6
  9. M. Patel and S. Sharma, “Detection of Malicious Attacks in MANET: a Behavioural Approach,” IEEE International Advance Computing Conference, pp. 388-393, 2013
  10. J. Kumar, M. Kulkarni and D. Gupta, “Effect of Black Hole Attack on MANET Routing Protocols,” 2013, International Journal of Computer Network and Information Security, vol. 5, pp. 64-72
  11. R. H. Jhaveri, S. J. Patel and D. C. Jinwala, “A Novel Approach for Gray Hole and Black Hole Attacks in Mobile Adhoc Nework,” 2012, IEEE 2nd International conference on Advanced Computing and Communication Technologies, pp. 556-560,
  12. N. Sharma and A. Sharma, “The Black Hole Node Attack in MANET,” 2012, IEEE Second International conference on Advanced Computing and Communication Technologies, pp. 546-550
Index Terms

Computer Science
Information Sciences

Keywords

MANETs AODV Black Hole Attack Security