Professional Documents
Culture Documents
[1] Introduction
A Mobile Ad-hoc Network is an infrastructure
less, configuring automatically when nodes are
coming together in a wireless medium. In these
Networks, Data are transferred between sender and
receiver by intermediate node. Mobile Ad-hoc
Networks have dynamic topology means any node
can easily move towards any network or leave a
network [23]. All nodes connected in a network
must act as routers to deliver the packet towards
destination. In Mobile Ad-hoc Networks where
there are two scheme single path and multi path.
Single path routing protocols find a single route but
optimal between a pair of sender and receiver. Here
a new route is discovers to need for every route
break that becomes too high overhead and latency.
But Multipath routing protocols establish
communication from source to destination by
Page 534
2.
3.
4.
Ad-hoc
Networks
Page 535
Page 536
[5] Conclusion
Black Hole attack is type of attack in the mobile
ad-hoc network which is to drop or eavesdrop the
message while route discovery. Black hole node
sends fake RREP to a sender node that initiates
route discovery, and receives data packets from the
source node. Many Methods are described different
solution for prevention and detection of black hole
attack. Various methods like secure route
discovery, modification of protocol, Using Route
Legitimacy value attached with RREP, Route
authentication, RREP Caching mechanism, Data
Routing Information, Timer based detection
mechanism, Trust scheme are surveyed. These are
methods to protect against black hole attacks which
give some improved result when black hole attack
is launched.
References
[1] Siddiqua, Ayesha, Kotari Sridevi, and Arshad
Ahmad Khan Mohammed. "Preventing black hole
attacks in MANETs using secure knowledge
algorithm." Signal Processing And Communication
Engineering Systems (SPACES), 2015 International
Conference on. IEEE, 2015.
[2] Bhandare, A. S., and S. B. Patil. "Securing MANET
against Co-operative Black Hole Attack and Its
Performance Analysis-A Case Study." Computing
Communication
Control
and
Automation
Page 537
[4] Dorri, Ali, and Hamed Nikdel. "A new approach for
detecting and eliminating cooperative black hole
nodes in MANET." Information and Knowledge
Technology (IKT), 2015 7th Conference on. IEEE,
2015.
[5] Chauhan, R. K. "An assessment based approach to
detect black hole attack in MANET." Computing,
Communication & Automation (ICCCA), 2015
International Conference on. IEEE, 2015.
[6] Jain, Ashish Kumar, and Vrinda Tokekar.
"Mitigating the effects of Black hole attacks on
AODV routing protocol in Mobile Ad hoc
Networks." Pervasive computing (ICPC), 2015
international conference on. IEEE, 2015.
[7] Kumar, Raushan, Abdul Quyoom, and Devki
Nandan Gouttam. "To mitigate black hole attack in
AODV." Next Generation Computing Technologies
(NGCT), 2015 1st International Conference on.
IEEE, 2015.
[8] Aware, Anand A., and Kiran Bhandari. "Prevention
of Black hole Attack on AODV in MANET using
hash function." Reliability, Infocom Technologies
and Optimization (ICRITO)(Trends and Future
Directions), 2014 3rd International Conference on.
IEEE, 2014.
[9] Dave, Dhaval, and Pranav Dave. "An effective
Black hole attack detection mechanism using
Permutation Based Acknowledgement in MANET."
Advances in Computing, Communications and
Informatics
(ICACCI,
2014
International
Conference on. IEEE, 2014.
[10] Patidar, Kriti, and Vandana Dubey. "Modification in
routing mechanism of AODV for defending
blackhole and wormhole attacks." IT in Business,
Industry and Government (CSIBIG), 2014
Conference on. IEEE, 2014.
[11] Kshirsagar, Vishvas, Ashok M. Kanthe, and Dina
Simunic. "Analytical approach towards packet drop
attacks in mobile ad-hoc networks." Computational
Intelligence and Computing Research (ICCIC),
2014 IEEE International Conference on. IEEE,
2014.
[12] Wahane, Gayatri, Ashok M. Kanthe, and Dina
Simunic. "Detection of cooperative black hole
attack using crosschecking with truelink in
MANET."
Computational
Intelligence
and
IEEE
[13] Cai, Ruo Jun, Peter Han Joo Chong, and Cherry Ye
Aung.
"Poster:
Trust-based
routing
with
neighborhood connectivity to prevent single and
colluded active black hole." Communications and
Networking in China (CHINACOM), 2014 9th
International Conference on. IEEE, 2014.
[14] Bhardwaj, Arpit. "Secure routing in DSR to mitigate
black hole attack." Control, Instrumentation,
Communication and Computational Technologies
(ICCICCT), 2014 International Conference on.
IEEE, 2014.
[15] Singh, Harsh Pratap, and Rashmi Singh. "A
mechanism for discovery and prevention of
coopeartive black hole attack in mobile ad hoc
network using AODV protocol." Electronics and
Communication
Systems
(ICECS),
2014
International Conference on. IEEE, 2014.
[16] Syed, U-H., Arif Iqbal Umar, and Fahad Khurshid.
"Avoidance of Black hole affected routes in AODVbased MANET." Open Source Systems and
Technologies (ICOSST), 2014 International
Conference on. IEEE, 2014.
[17] Tan, Siew-Chong, and Keecheon Kim. "Secure
Route Discovery for preventing black hole attacks
on AODV-based MANETs." High Performance
Computing and Communications & 2013 IEEE
International Conference on Embedded and
Ubiquitous Computing (HPCC_EUC), 2013 IEEE
10th International Conference on. IEEE, 2013.
[18] Rani, Jyoti, and Narendra Kumar. "Improving
AOMDV protocol for black hole detection in
Mobile Ad hoc Network." Control Computing
Communication & Materials (ICCCCM), 2013
International Conference on. IEEE, 2013.
[19] Kshirsagar, Durgesh, and Abhijit Patil. "Blackhole
attack detection and prevention by real time
monitoring." Computing, Communications and
Networking Technologies (ICCCNT), 2013 Fourth
International Conference on. IEEE, 2013.
[20] Jhaveri, Rutvij H. "MR-AODV: A solution to
mitigate blackhole and grayhole attacks in AODV
based MANETs." Advanced Computing and
Communication Technologies (ACCT), 2013 Third
International Conference on. IEEE, 2013.
[21] Jose, Jubil, and C. R. Rigi. "A comparative study of
topology enabled and topology hiding multipath
routing protocols in MANETs." Electrical,
Electronics,
Signals,
Communication
and
Optimization
(EESCO),
2015
International
Conference on. IEEE, 2015.
[22] Chavda, Ketan S., and Ashish V. Nimavat.
"Removal of black hole attack in AODV routing
protocol of MANET." Computing, Communications
Page 538
Page 539
Table 1. Literature Survey for Prevention and Detection of Black hole Attack
Sr
.
N
o
Author
Paper Title
Method Name
Protocol
Tool
Prevention
/
Detection
Remark
Ayesha
Siddiqua
et. al.[1]
Preventing Black
Hole Attacks in
MANETs
Using Secure
Knowledge
Algorithm
Secure
Knowledge
Algorithm
AODV
NS-2.35
Yes/Yes
Miss
Bhandare
A.S. et.
al.[2]
Malicious Node
Detection System
AODV
NS-2.35
Yes/Yes
Nidhi
Choudhar
y et. al.[3]
Timer-Based
Detection
Mechanism
AODV
EXatacyber
Yes/Yes
Ali Dorri
et. al.[4]
Securing MANET
against Cooperative Black
Hole
attack and its
performance
analysis-A case
study
Preventing Black
Hole Attack in
AODV using
Timer-Based
Detection
Mechanism
A New Approach
for Detecting and
Eliminating
Cooperative
Black hole Nodes
in MANET
Data Routing
Information
AODV
Opnet
14.5
No/Yes
Pooja et.
al.[5]
An Assessment
Based Approach
to
Detect Black hole
Attack in
MANET
Local utility
function based
scheme
Hint-based
Probabilisti
c routing
protocol
ONE
1.5.1RC2 Java
Based
simulator
NO/Yes
Ashish
Kumar
Jain et.
al.[6]
Mitigating the
Effects of Black
hole Attacks on
AODV Routing
Protocol in
Mobile Ad Hoc
Networks
RREP caching
mechanism
AODV
NS-2
Yes/Yes
Raushan
Kumar et.
al.[7]
To Mitigate Black
Hole Attack in
AODV
Secure Route
Discovery
AODV
NS-2
Yes/Yes
Anand A.
Aware et.
al.[8]
Prevention of
Black hole Attack
on AODV in
MANET using
Using Hash
Function
AODV
NS-2
Yes/Yes
Proposed Method
19% Result
improved in Black
hole Attack AODV
routing protocol.
RREP caching
mechanism to
overcome the
problem of black
hole attack.
Proposed Method
increase the PDR
for three different
environments with
node mobility.
Proposed Method
for
detection/preventio
n of Black hole,
In Network if any
node drops the
packet, Algorithm
checks for the
packet drop
reasons. The
Algorithm used
Promiscuous mode
to monitor nodes
activity.
Packet
Modification is
required. No extra
Overhead required.
Proposed Approach
gives better Packet
Delivery Ratio
than AODV and
Black hole Attack
AODV
This Method takes
less overhead and
processing timing
to eliminate the
Black hole attack
with False Positive
detection from the
network by using
TCP
connections.
Page 540
hash function
Dhaval
Dave et.
al.[9]
An Effective
Black Hole
Attack Detection
Mechanism using
Permutation
Based
Acknowledgemen
t in MANET
Permutation
Based
Acknowledgemen
t
AOMSR
NS-2
No/Yes
10
Kriti
Patidar et.
al.[10]
Modification in
Routing
Mechanism of
AODV for
Defending
Blackhole and
Wormhole
Attacks
Intrusion
Detection System
based on the
concept of
SpecificationBased
Detection System
AODV
NS-2.35
Yes/Yes
11
Vishvas
Kshirsagar
et. al.[11]
Analytical
Approach towards
Packet Drop
Attacks in
Mobile Ad-hoc
Networks
Bayes Theorem
and Prior
probability
AODV
12
Gayatri
Wahane
et. al.[12]
Detection of
Cooperative
Black Hole
Attack
using
Crosschecking
with TrueLink in
MANET
crosschecking
with True-Link
(timing based
countermeasure)
concept
AODV
NS-2
Yes/Yes
13
Ruo Jun
Cai et.
al.[13]
Trust Scheme
(Neighbourhood
Connectivity
Based Trust)
DSR
NS-2
Yes/Yes
No/yes
cooperative black
hole and grey hole
attack. It will select
optimal path and
authenticate packet
using SHA
algorithm.
Some Assumption
is made for
proposed scheme.
This method gives
high throughput,
less overhead as
compares to
AODV.
This method detects
a hop count
analysis approach
to detect wormhole
attacks along routes
in ad hoc networks.
The proposed
protocol does not
require any location
information, time
synchronization, or
special hardware to
detect wormhole
attacks.
Analysis approach
to identify packet
drop attack.
Proposed method
finds the un-trusted
node from the
network, if any untrusted node found,
the performance of
the network can be
improved by
eliminate that node
True-Linkcrosschecking
enhances AODV
protocol to improve
the network
performance
according to
routing update
condition. This
solution reduces
routing overhead,
delay and
maximum
throughput when
number of nodes
and pause time
more.
This Method is
requires every node
to exchange
neighbour
information
regularly by
sending Hello
message and then
Page 541
Black Hole
14
Ashutosh
Bhardwaj
et. al.[14]
15
Harsh
Pratap
Singh et.
al.[15]
16
Ume-Rani
Syed et.
al.[16]
17
Seryvuth
Tan et.
al.[17]
18
Jyoti Rani
et. al.[18]
19
Durgesh
Kshirsagar
et. al.[19]
20
Ketan S.
Chavda et.
al.[20]
21
Rutvij H.
Jhaveri
et. al.[21]
Secure Routing in
DSR to Mitigate
Black Hole
Attack
A Mechanism for
Discovery and
Prevention of
Cooperative
Black hole attack
in Mobile Ad hoc
Network Using
AODV Protocol
Authentication of
route
DSR
NS-2.35
Yes/Yes
Broadcast
Synchronization
and Relative
Distance method
of clock
synchronization
AODV
NS-2.34
Yes/Yes
Avoidance of
Black hole
Affected Routes
in AODV Based
MANET
Secure Route
Discovery for
Preventing Black
Hole
Attacks on
AODV-based
MANETs
Using Route
Legitimacy value
attached with
RREP
AODV
NS-2
Yes/Yes
Secure Route
Discovery
AODV
NS-2
Yes/Yes
Improving
AOMDV
Protocol for Black
Hole
Detection in
Mobile Ad hoc
Network
Blackhole Attack
Detection and
Prevention by
Real Time
Monitoring
Removal of Black
Hole Attack In
AODV Routing
Protocol of
MANET
MR-AODV: A
Solution to
Mitigate
Blackhole and
Grayhole Attacks
in AODV Based
MANETs
Modification in
RREQ, RREP and
Routing Table
AOMDV
MATLA
B
No/Yes
Real
Time Monitoring
AODV
NS-2.34
Yes/Yes
Sequence number
of RREP message
AODV
NS-2
Yes/Yes
AODV
NS-2
Yes/Yes
Proposed method
achieves a
considerable
rise in PDR and
Throughput
This method
detection and
isolation of
multiple malicious
nodes during route
discovery process
and discovers a
short and secure
route to destination
without extra
control packets
Proposed scheme
for detection
process is sometime
failed in the clock
synchronization. In
this case this
proposed another
method for black
hole detection using
Relative Velocity
distance
Just Proposed
Scheme, yet not
implemented.
Based on Threshold
environment
proposed method
compare the RREQ
and RREP
sequence no for
mitigating Black
hole Attack.
This Method cant
detect Grayhole
Attack
Page 542