A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET)
DOI:
https://doi.org/10.12962/j24068535.v16i1.a654Abstract
The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET) make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server. Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP) for any received route request packets (RREQ). When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination. Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.
Downloads
References
[2] G. Wahane, A. M. Kanthe, and D. Simunic, “Technique for detection of cooperative black hole attack using true-link in Mobile Ad-hoc Networks,” 37th Int. Conv. Inf. Commun. Technol. Electron. Microelectron. MIPRO 2014 - Proc., no. May, pp. 1428–1434, 2014.
[3] R. Prakash, S. Member, and I. C. Society, “Low-Cost Checkpointingl and Failure Recovery in Mobile Computing Systems,” IEEE Trans. Parallel Distrib. Syst., vol. 7, no. October, pp. 1035–1048, 1996.
[4] A. Harter and A. Hopper, “A Distributed location system for the active office,” IEEE Netw., pp. 62–70, 1994.
[5] K. J. Sarma, R. Sharma, and R. Das, “A survey of Black hole attack detection in Manet,” 2014 Int. Conf. Issues Challenges Intell. Comput. Tech., pp. 202–205, 2014.
[6] F. Stajano and R. Anderson, “The Resurrecting Duckling :Security Issues for Ubiquitous Computing,” pp. 22–26, 2003.
[7] G. A. Jacoby, R. Marchany, N. D. Iv, and S. Member, “Battery-Based Intrusion Detection : A First Line of Defense,” in Proceedings of the 2004 IEEE Workshop on Information Assurance, 2004, no. June, pp. 272–279.
[8] A. Abdelaziz, M. Nafaa, and G. Salim, “Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks,” in UKSim 15th International Conference on Computer Modelling and Simulation Survey, 2013.
[9] S. N. Ferdous and S. Hossain, “Randomized Energy-Based AODV Protocol For Wireless Ad-Hoc Network,” in iCEEiCT, 2016, pp. 1–5.
[10] A. M. Kanthe, D. Simunic, and M. Djurek, “Denial of Service ( DoS ) Attacks in Green Mobile Ad – hoc Networks,” in MIPRO, 2012, pp. 675–680.
[11] S. R. Deshmukh, P. N. Chatur, and N. B. Bhople, “AODV-Based Secure Routing Against Blackhole Attack in MANET,” pp. 1960–1964, 2016.
[12] R. Kashyap, “Prevention of Black Hole Attack in MANET,” Int. J. Comput. Eng. Res. Trends, vol. 351, no. 5, pp. 2349–7084, 2015.
[13] B. Singh, D. Srikanth, and S. C. . Kumar, “Mitigating effects of Black hole Attack in Mobile Ad-hoc Networks : Military Perspective,” in IEEE International Conference on Engineering and Technology (ICETECH), 2016, no. March.
[14] G. Wahane and S. Lonare, “Technique for detection of cooperative black hole attack in MANET,” 2013 4th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT, 2013.
[15] S. Singh, A. Mishra, and U. Singh, “Detecting and avoiding of black hole attack on MANET using trusted AODV Routing Algorithm,” in 2016 Symposium on Colossal Data Analysis and Networking (CDAN), vol. 87, pp. 5–10.
[16] A. Dorri and H. Nikdel, “A New Approach for Detecting and Eliminating Cooperative Black hole Nodes in MANET,” in IKT2015 7th International Conference on Information and Knowledge Technology, 2015, pp. 1–12.
[17] M.-Y. Su, “Preventi on of selective black hole attacks on mobile ad hoc networks through intrusion detection systems,” Comput. Commun., vol. 34, no. 1, pp. 107–117, 2011.
[18] A. Baadache and A. Belmehdi, “Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks,” Comput. Networks, vol. 73, pp. 173–184, 2014.
[19] C. Panos, C. Ntantogian, S. Malliaros, and C. Xenakis, “Analyzing, Quantifying, and Detecting the Blackhole attack in Infrastructure-less Networks,” Comput. Networks, vol. 113, pp. 94–110, 2016.
[20] Pooja and R. K. Chauhan, “An Assessmnet Based Approach To Detect Black Hole Attack In MANET,” in International Conference on Computing, Communication and Automation (ICCCA), 2015, pp. 552–557.
[21] R. K. Bar, J. K. Mandal, and M. M. Singh, “QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack,” in International Conference on Computational Intelligence: Modeling Techniques and Applications CIMTA), 2013, vol. 10, pp. 530–537.
[22] A. Rana, V. Rana, and S. Gupta, “EMAODV: Technique to Prevent Collaborative Attacks in MANETs,” Procedia Comput. Sci., vol. 70, pp. 137–145, 2015.
Downloads
Published
Issue
Section
How to Cite
License
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in JUTI unless they receive approval for doing so from the Editor-in-Chief.
JUTI open access articles are distributed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.