A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET)

Authors

  • Pascal Maniriho Department of Informatics, Institut Teknologi Sepuluh Nopember
  • Maurice Ntahobari Department of Informatics, Institut Teknologi Sepuluh Nopember
  • Radityo Anggoro Department of Informatics, Institut Teknologi Sepuluh Nopember
Views: 795 Downloads: 379

DOI:

https://doi.org/10.12962/j24068535.v16i1.a654

Abstract

The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET) make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP) for any received route request packets (RREQ). When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

Downloads

Download data is not yet available.

References

[1] N. Choudhary and L. Tharani, “Preventing black hole attack in AODV using timer-based detection mechanism,” Int. Conf. Signal Process. Commun. Eng. Syst. - Proc. SPACES 2015, Assoc. with IEEE, pp. 1–4, 2015.

[2] G. Wahane, A. M. Kanthe, and D. Simunic, “Technique for detection of cooperative black hole attack using true-link in Mobile Ad-hoc Networks,” 37th Int. Conv. Inf. Commun. Technol. Electron. Microelectron. MIPRO 2014 - Proc., no. May, pp. 1428–1434, 2014.

[3] R. Prakash, S. Member, and I. C. Society, “Low-Cost Checkpointingl and Failure Recovery in Mobile Computing Systems,” IEEE Trans. Parallel Distrib. Syst., vol. 7, no. October, pp. 1035–1048, 1996.

[4] A. Harter and A. Hopper, “A Distributed location system for the active office,” IEEE Netw., pp. 62–70, 1994.

[5] K. J. Sarma, R. Sharma, and R. Das, “A survey of Black hole attack detection in Manet,” 2014 Int. Conf. Issues Challenges Intell. Comput. Tech., pp. 202–205, 2014.

[6] F. Stajano and R. Anderson, “The Resurrecting Duckling :Security Issues for Ubiquitous Computing,” pp. 22–26, 2003.

[7] G. A. Jacoby, R. Marchany, N. D. Iv, and S. Member, “Battery-Based Intrusion Detection : A First Line of Defense,” in Proceedings of the 2004 IEEE Workshop on Information Assurance, 2004, no. June, pp. 272–279.

[8] A. Abdelaziz, M. Nafaa, and G. Salim, “Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks,” in UKSim 15th International Conference on Computer Modelling and Simulation Survey, 2013.

[9] S. N. Ferdous and S. Hossain, “Randomized Energy-Based AODV Protocol For Wireless Ad-Hoc Network,” in iCEEiCT, 2016, pp. 1–5.

[10] A. M. Kanthe, D. Simunic, and M. Djurek, “Denial of Service ( DoS ) Attacks in Green Mobile Ad – hoc Networks,” in MIPRO, 2012, pp. 675–680.

[11] S. R. Deshmukh, P. N. Chatur, and N. B. Bhople, “AODV-Based Secure Routing Against Blackhole Attack in MANET,” pp. 1960–1964, 2016.

[12] R. Kashyap, “Prevention of Black Hole Attack in MANET,” Int. J. Comput. Eng. Res. Trends, vol. 351, no. 5, pp. 2349–7084, 2015.

[13] B. Singh, D. Srikanth, and S. C. . Kumar, “Mitigating effects of Black hole Attack in Mobile Ad-hoc Networks : Military Perspective,” in IEEE International Conference on Engineering and Technology (ICETECH), 2016, no. March.

[14] G. Wahane and S. Lonare, “Technique for detection of cooperative black hole attack in MANET,” 2013 4th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT, 2013.

[15] S. Singh, A. Mishra, and U. Singh, “Detecting and avoiding of black hole attack on MANET using trusted AODV Routing Algorithm,” in 2016 Symposium on Colossal Data Analysis and Networking (CDAN), vol. 87, pp. 5–10.

[16] A. Dorri and H. Nikdel, “A New Approach for Detecting and Eliminating Cooperative Black hole Nodes in MANET,” in IKT2015 7th International Conference on Information and Knowledge Technology, 2015, pp. 1–12.

[17] M.-Y. Su, “Preventi on of selective black hole attacks on mobile ad hoc networks through intrusion detection systems,” Comput. Commun., vol. 34, no. 1, pp. 107–117, 2011.

[18] A. Baadache and A. Belmehdi, “Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks,” Comput. Networks, vol. 73, pp. 173–184, 2014.

[19] C. Panos, C. Ntantogian, S. Malliaros, and C. Xenakis, “Analyzing, Quantifying, and Detecting the Blackhole attack in Infrastructure-less Networks,” Comput. Networks, vol. 113, pp. 94–110, 2016.

[20] Pooja and R. K. Chauhan, “An Assessmnet Based Approach To Detect Black Hole Attack In MANET,” in International Conference on Computing, Communication and Automation (ICCCA), 2015, pp. 552–557.

[21] R. K. Bar, J. K. Mandal, and M. M. Singh, “QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack,” in International Conference on Computational Intelligence: Modeling Techniques and Applications CIMTA), 2013, vol. 10, pp. 530–537.

[22] A. Rana, V. Rana, and S. Gupta, “EMAODV: Technique to Prevent Collaborative Attacks in MANETs,” Procedia Comput. Sci., vol. 70, pp. 137–145, 2015.

Downloads

Published

2018-01-29

Issue

Section

Articles

How to Cite

[1]
P. Maniriho, M. Ntahobari, and R. Anggoro, “A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET)”, JUTI, vol. 16, no. 1, pp. 18–26, Jan. 2018, doi: 10.12962/j24068535.v16i1.a654.