Skip to main content

Comparative Study on Black Hole Attack in Mobile Ad-Hoc Networks

  • Conference paper
  • First Online:
Intelligent Systems Design and Applications (ISDA 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 717))

  • 225 Accesses

Abstract

An ad-hoc network is dynamic in nature as it configured and managed its route by itself or a network having no infrastructure. A number of nodes temporary creates a dynamic network to transfer data from one location to another. There are lot of routing protocols that are used to make the data from a single node to another. As no infrastructure is available and due to this most of the routing protocols rely on coordination of the nodes for secure communication. So the MANETs security has become one of the most important factor for all the times. There are lot of attacks that could harm overall effectiveness of the MANETs like: black hole, wormhole, rushing attacks etc. The black hole is a most dangerous attack of MANETs in which we have some malicious node which are not exist in network but packet is redirected to that node. Many re-search scholars worked on it and proposed different detection and prevention methods to overcome the problems of black hole attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Talukdar, M.I., Hassan, R., Hossen, M.S., Ahmad, K., Qamar, F., Ahmed, A.S.: Performance improvements of AODV by black hole attack detection using IDS and digital signature. Wireless Commun. Mobile Comput. 2021, Article ID 6693316, 13 (2021)

    Google Scholar 

  2. Gurung, S., Chauhan, S.: Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wireless Netw. 25(3), 975–988 (2017). https://doi.org/10.1007/s11276-017-1639-2

    Article  Google Scholar 

  3. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: “Detecting Black-hole Attack in Mobile Ad Hoc Networks”, Paper presented at the 5th European Personal Mobile Communications Conference, pp. 22–25. Glasgow, U.K. (2003)

    Google Scholar 

  4. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. In: 2003 International Conference on Wireless Networks (ICWN’03), Las Vegas, Nevada, USA

    Google Scholar 

  5. Mistry, N, Jinwala, D.C., IAENG, Zaveri, M.: Improving AODV Protocol Against Blackhole Attacks. In: Paper presented at the International MultiConference of Engineers and Computer Scientists, Hong Kong, pp. 17–19, (2010)

    Google Scholar 

  6. Umaparvathi, M., Varughese, D.K.: Two Tier Secure AODV against Black Hole Attack in MANET. Europ. J. Sci. Res. 72(3) (2012)

    Google Scholar 

  7. Medadian, M., Fardad, K.: Proposing a method to detect black hole attacks in AODV routing protocol. European J. Sci. Res. 69(1) (2012)

    Google Scholar 

  8. Pooja, J., Rakesh, K.: Prevention of black hole attack in MANET. Int. J. Comput. Netw. Wireless Commun. (IJCNWC), ISSN: pp. 2250–3501, vol. 2, No 5, October (2012)

    Google Scholar 

  9. Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless Ad Hoc networks. Commun. Mag. IEEE 40(10), 70–75 (2002)

    Article  Google Scholar 

  10. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: 5th European Personal Mobile communications Conference, Glasgow, United Kingdom, 22–25 April (2003)

    Google Scholar 

  11. Al-Shurman, M., Yoo, S.M., Park, S.: Black hole attack in mobile Ad Hoc networks. In: 42nd Annual ACM Southeast Regional Conference (ACM- E’42), Huntsville, Alabama, 2–3 April (2004)

    Google Scholar 

  12. Yu, C.W., Wu, T.-K., Cheng, R.H., Chang, S.C.: A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks. In: Washio, T. (ed.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 538–549. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77018-3_54

  13. de Groot, A.C., Toonstra, J.: 10. In: Casuïstiek in de dermatologie deel 2, pp. 33–36. Bohn Stafleu van Loghum, Houten (2010). https://doi.org/10.1007/978-90-313-8458-7_10

  14. Khamayseh, Y., Bader, A., Mardini, W., BaniYasein, M.: A new protocol for detecting black hole nodes in Ad Hoc networks. Int. J. Commun. Netw. Inform. Secur. 3(1), 36–47 (2011)

    Google Scholar 

  15. Kalia, N., Sharma, H.: Detection of Multiple Black hole nodes attack in MANET by modifying AODV protocol. Int. J. Comput. Sci. Eng. 8(5), 160–174 (2016)

    Google Scholar 

  16. Sathya, M., Priyadharshini, M.: Detection and removal of black hole attack in mobile ad-hoc networks using cooperative bait detection method scheme. Int. J. Sci. Eng. Res. 7(3), 81–85 (2016)

    Google Scholar 

  17. Supriya, Dr. Shobha, K.R.: Detection and avoidance of coordinated black hole attack in MANETs’. JCR 7(13), 2847–2858 (2020)

    Google Scholar 

  18. Vatambeti, R., Sangeetha Supriya, K., Sanshi, S.: Identifying and detecting black hole and gray hole attack in MANET using gray wolf optimization. Int. J. Commun. Syst. (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gajendra Kumar Ahirwar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ahirwar, G.K., Agarwal, R., Pandey, A. (2023). Comparative Study on Black Hole Attack in Mobile Ad-Hoc Networks. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds) Intelligent Systems Design and Applications. ISDA 2022. Lecture Notes in Networks and Systems, vol 717. Springer, Cham. https://doi.org/10.1007/978-3-031-35510-3_48

Download citation

Publish with us

Policies and ethics