You are on page 1of 9

Imperial Journal of Interdisciplinary Research (IJIR)

Vol-2, Issue-4, 2016


ISSN: 2454-1362, http://www.onlinejournal.in

Prevention and Detection of Black Hole


Attack in MANET: A Survey
Mitul Bhatt1, Hinaxi Patel2 & Swati Kariya3
1

PG Scholar (Computer Engineering), SVM Institute of Technology, Bharuch 392-001,


Gujarat, India
2&3
Department of Computer Engineering, SVM Institute of Technology, Bharuch 392-001,
Gujarat, India
Abstract : Mobile Ad-hoc Networks (MANETS) are
the networks which are temporary, dynamic, selfconfigurable and self-maintainable. MANETs
nodes are communicated with each other as being
in dynamic topology and without any fix
infrastructure. In MANET each and every node
acts as a client and server. Any node in the MANET
can join and leave the network without any
permission. In MANETS have different types of
security active attacks like Black Hole, Worm Hole,
Grey Hole and Sink Hole Attack which disrupts the
network or gaining the data by attacker. Black
Hole Attacks are serious security risk to the routing
protocol in MANETS. Black Hole Attacks are a
kind of attacks where a malicious node advertise
itself a shortest path during routing discovery and
redirect the data towards malicious node.
Malicious node dropped the data or its desired
destination instead of original destination. In This
Paper focuses of various prevention and detection
methods for Black Hole Attack described.
Keywords: Black hole attack, Black hole attack
detection and prevention, survey of black hole
detection and prevention

having multipath routes, if a primary route fails


then backup routes are used for efficient data
delivery at their destination. Routing Protocols are
generally classified into three groups such as
Proactive (Table Driven), Reactive (On Demand)
and Hybrid based on route discovery and their
mechanism. The Proactive routing protocols decide
the routes to all destinations at beginning and
maintain using periodic update process based on
their mechanism. e.g. DSDV. The disadvantages of
these algorithms are to update the routing tables
often which consume a large amount of memory,
bandwidth and power. But, in the reactive routing
protocol, there is no need to maintain the routing
data in routing table by each node. The routes are
decide and maintained only when they are required
by the source for data transmission during route
discovery process and the routing overhead is
reduced. e.g. Dynamic Source Routing (DSR) and
Adhoc on Demand Distance Vector (AODV) are
reactive routing protocols. The qualities of both
proactive and reactive protocols are combined
jointly to form a new making of protocols called
hybrid routing protocols e.g. ZRP, TORA [22]

[1] Introduction
A Mobile Ad-hoc Network is an infrastructure
less, configuring automatically when nodes are
coming together in a wireless medium. In these
Networks, Data are transferred between sender and
receiver by intermediate node. Mobile Ad-hoc
Networks have dynamic topology means any node
can easily move towards any network or leave a
network [23]. All nodes connected in a network
must act as routers to deliver the packet towards
destination. In Mobile Ad-hoc Networks where
there are two scheme single path and multi path.
Single path routing protocols find a single route but
optimal between a pair of sender and receiver. Here
a new route is discovers to need for every route
break that becomes too high overhead and latency.
But Multipath routing protocols establish
communication from source to destination by

Imperial Journal of Interdisciplinary Research (IJIR)

Figure 1. Black Hole Attack example [17]

Page 534

Imperial Journal of Interdisciplinary Research (IJIR)


Vol-2, Issue-4, 2016
ISSN: 2454-1362, http://www.onlinejournal.in
Attack uses multiple nodes in a group act as
malicious node [25].

[2] Mobile Ad-hoc Network App


There is various Mobile
application as are below [24].
1.

2.

3.

4.

Ad-hoc

Networks

Crisis Management: Large scale disaster


like earthquake, flood or tsunami that has
damaged the place of Network. In such
case MANETs can be used by the army
and rescue teams to build an ad-hoc
network
to
communicate
among
themselves.
Military Operations: At places and times
in combat where there is no fixed base
station MANETs can be used for
communication with militaries, vehicles
and the headquarters.
Local Level: Conference and Classrooms
or any advertisement being spread in a
commercial sector using Wi-Fi and
Bluetooth.
Personal Area Network: It is a short range
network that is used to communicate
between the two devices like a mobile
phone, a laptop using mechanisms like
Bluetooth and hotspots.

[3] Security Attacks in MANETs


All Routing protocols are vulnerable to
different security attacks. Attacks can be generally
divided into two categories as passive attack and
active attack. 1. Passive attack: The attacker does
not affect with the normal operation of the routing
protocol but only gets the information by listening
to the network traffic. 2. Active attack: The
attacker modifies the exchanged data which
includes removal of the information too [24].
Black hole Attack is a type of Denial of Service
Attack [24]. Black hole Attack is a malicious node
uses its routing protocol to advertise itself having
the shortest path towards destination node. When
route is established, then malicious node drops the
packets or forwards it to the attacker desired
address [24].
In the Black Hole Attack the attacker must
create a RREP with Destination sequence
greater than the destination sequence of the
receiver node. The sender node believes that black
hole node and further communicates with this black
hole node instead of original destination node.
Black hole Attacks are classified into two
categories A. Single Black Hole Attack: Single
Black Hole attack uses only single node acts as
malicious node within a zone. B. Collaborative
Black Hole Attack: Collaborative Black Hole

Imperial Journal of Interdisciplinary Research (IJIR)

[4] Related Work


Ayesha Siddiqua et. al. [1] proposed an approach
for detection and prevention of Black hole attack
using secure knowledge algorithm in which it used
promiscuous mode to ensure data delivery to
receiver node, also finds packet drop reasons
before declaring node as a black hole node. In this
method, AODV protocol is modified, so that every
node in a network listens to its neighboring nodes
promiscuously and nodes compares the neighbor
node information stores in its fm and rm table
entries: fm table hold the detail about recent packet
forwarded. rm table hold the detail about
neighboring node detail like destination address,
TTL value, and Node Energy. If any entries in the
table which has fm rm and threshold value is
reached then modification attack otherwise trusted
node. If rm and threshold value is reached then
Black hole attack.
Miss Bhandare A.S. et. al. [2] proposed an
approach against Co-operative Black hole attack in
which it used detection and defense mechanism is
proposed to remove the intruder that bring out
black hole attack by taking decision about safe
route on basis of Normal V/S Abnormal activity.
Various Fake RREP Parameter like Destination
sequence Number, Hop Count, Destination IP
Address, Time Stamp are considered are make
them decision to identify the attack is called
Malicious node Detection System (MDS).This
method improved the PDR up to 76 to 99 % . The
advantage of this method is that decision about
unsafe route is taken independently by source and
no any additional overhead required.
Nidhi Choudhary et. al. [3] proposed solution for
avoidance of black hole attack by detection of the
malicious attacker using timer based detection
approach. In this method each node defines a trust
value for its neighbor node and inserts a timer with
each data packet, if the trust value decreases below
a threshold value for any node then all other nodes
put that node in their blacklist table.
Ali Dorri et. al. [4] proposed solution for
detection and elimination of cooperative Black hole
Attack, when the source node wants to send data
packets to the destination, at first it uses AODV
routing protocol to find a recent fresh path. By
selecting the best path, the source node checks the
Next_Hop_Node and Previous_Hop_Node of the
RREP in order to check the safety of the path. By
using a Data Routing Information table (which has
Node Id, From and Through column; Indicates

Page 535

Imperial Journal of Interdisciplinary Research (IJIR)


Vol-2, Issue-4, 2016
ISSN: 2454-1362, http://www.onlinejournal.in
receive data from the specific node and the node
sent packet data through the specific node in the
network respectively,) the source node can detect
malicious nodes and eliminate them from the
network. In this Proposed Method used TCP
connections in order to decrease false positive
detection. By Simulation results, it decreased the
packet overhead and processing time in malicious
nodes detection.
Pooja et. al. [5] proposed solution for Black hole
attack detection. Hint-based Probabilistic routing
protocol is used to detect Black hole nodes. Each
node hint value computed and to store value at each
nodes buffer. In this method to calculate the hint
value of all neighbor nodes of sender and to check
the value with trusted authority (Hint Value <=
Trusted Authority) if yes then set the node as Black
hole node otherwise Fair node.
Ashish Kumar Jain et. al. [6] proposed solution
for Black hole Attack detection using RREP
caching Mechanism. In this method modified the
AODV routing protocol by ignoring the first RREP
packet reaching the source node. Simulation shows
that this method modified AODV protocol works
very well under no. of black hole nodes.
Raushan Kumar et. al. [7] proposed solution for
black hole attack detection to modify the AODV
at source and Destination node. In this approach
secure route discovery the receiver node and the
sender node verifies the sequence numbers in the
RREP and RREQ messages respectively. Every
time RREP and RREQ message comes to
respective node the sequence no. of the packet
compares with the threshold value for prevention
and detection of Black hole Attack in a network.
Here threshold value is defined for different three
environments (Small, Medium, and Large) and
compare with respective threshold value.
Anand A. Aware et. al. [8] proposed solution for
Black hole attack prevention/detection using hash
function where first RREP reject from its neighbor
and will select the second optimal path. This
method continuously monitors the network to
identify the malicious node like Black hole, Gray
hole, Co-operative Black hole Attack. This method
uses to authentic packets using SHA.
Dhaval Dave et. al. [9] proposed Ad-hoc Ondemand Multipath Secure Routing (AOMSR) using
Permutation based Acknowledgement scheme for
detection of black hole attack. This scheme is
enhancement of Adaptive Acknowledgement
(AACK) and TWO-ACK. This method gives better
result as compare to AODV.

Imperial Journal of Interdisciplinary Research (IJIR)

Kriti Patidar et. al. [10] proposed two techniques


namely hop-count analysis and specification based
intrusion detection for detecting and preventing
wormhole and black hole attacks respectively.
AODV routing behavior and individual nodes
monitor the routing behavior of their neighbors for
detecting run-time violation of the specifications.
In this Method modifies the Counting Field of
RREP message is proposed to enable the
monitoring and broadcast as opposed to unicast.
According to simulation results the proposed
techniques show better performance as PDR,
throughput and average end-to-end delay.
Ashutosh Bhardwaj et. al. [14] proposed method
to secure Routing in DSR to mitigate the black hole
attack. In this Method Modified the DSR Route
reply, so that when destination gives reply to
reverse path node, it will be generate plain packet,
if packet sent then normal node else it will be
consider as malicious node.
Vishvas Kshirsagar et. al. [11] proposed method
finds the un-trusted node from the network, if any
un-trusted node found, the performance of the
network can be improved by eliminate that node
using Bayes Theorem and Prior probability.
Gayatri Wahane et. al. [12] proposed Detection of
Cooperative
Black
Hole
Attack
using
Crosschecking with TrueLink (timing based
countermeasure) in AODV. In this method
TrueLink crosschecking will be exchanged
information between MAC layer and Network
layer every time and information store in DRI table
same as [4] the behavior is monitored using true
link and the method can reduce false malicious
detection. This solution reduces routing overhead,
delay and maximum throughput when number of
nodes and pause time more.
Ruo Jun Cai et. al.[13] proposed Extented
Neighborhood Connectivity Based Trust Scheme
which is periodically broadcast Hello message to
include two hops topology instead of only direct
neighbors. Now when source node receives a route
reply from three hops, then it will searches the
information stored in neighborhood connectivity
information table (NCIT) to verify whether the
intermediate node1 and its another intermediate
node2 as a direct neighbor and whether node
destination can be reached via intermediate node2.
If the replied path is not consistent with the NCIT,
node Source node will drop this RREP and down
the trust level of node intermediate node1. During
this way, it can identify both single and colluded
active black hole attackers.

Page 536

Imperial Journal of Interdisciplinary Research (IJIR)


Vol-2, Issue-4, 2016
ISSN: 2454-1362, http://www.onlinejournal.in
Harsh Pratap Singh et. al. [15] proposed a
Mechanism for Discovery and Prevention of
Co-operative Black hole attack in AODV using
Broadcast Synchronization. In this method the First
step of solution is to compare the internal clock
time with external clock time sequence. The time
sequence of internal and external clock if compared
with standard threshold time clock, the clock time
of normal mobile node is greater than the threshold
time initialization time duration and other nodes are
blacklisted. Proposed scheme for detection process
is sometime failed in the clock synchronization. In
this case this proposed another method for black
hole detection using Relative Velocity distance.
Ume-Rani Syed et. al. [16] proposed scheme for
avoidance of Black hole Attack using AODV. In
this method it is used Route Legitimacy value
attached with RREP. Here RREP used additional
table to store validity value with other require node
detail like destination sequence number. A validity
check is implemented at receiver node which
returns the legitimacy of a route and makes a
secure entry in routing table with less processing
overhead.
Seryvuth Tan et. al. [17] proposed Secure Route
Discovery for Preventing Black Hole Attacks on
AODV. This method requires the source node and
the destination node to verify the sequence
numbers in the RREQ and RREP messages,
respectively, based on defined thresholds same as
[7] before establishing a connection with a
destination node for sending the data.
Jyoti Rani et. al. [18] proposed solution for black
hole attack using modification of AOMDV. This
Method Modification in routing such as First field
is first hop which stores the value of first hop
directly after the node initiating RREQ. It is used to
avoid loops in the path formation and when a node
receives an RREP, this field is used to store the
value of originator field of RREP. Valid Bit field
has only three values 0, 1 and -1. Value 0: Path to
the destination through next hop may not be
correct; value 1: Path to the destination is free from
malicious nodes and value -1: entry has not been
chosen for data transfer.
Durgesh Kshirsagar et. al. [19] proposed method
to detect and prevent Black hole Attack using
promiscuous mode. Here, Neighbors node
maintains two counters Forward count-fcount and
Receive Count-rcount used for counting number of
forwarded packets and number of received packets
respectively. fcount is incremented by Neighbor
node when it transmits a packet to suspected node.
If suspected node forwards the packet, it will be
overheard by Neighbor node and it increments

Imperial Journal of Interdisciplinary Research (IJIR)

receive count -rcount. Finally, Neighbor node will


forward packets to suspected node until forward
count -fcount reaches a threshold; then if rcount is
0, RREP originator node is identified as malicious
node. Here real monitoring using promiscuous
mode helped in identifying malicious node without
false positive rate.
Ketan S. Chavda et. al. [20] Proposed Method to
detect and prevent the Black hole attack on AODV.
In this method compare RREP (R1 and R2) with
the Destination Sequence Number of reply and
select high Destination Sequence Number that is
suspect to be malicious node an Alert message that
contains the node id for prevention of Black hole
Attack.
Rutvij H. Jhaveri et. al. [21] proposed solution to
mitigate Blackhole and Grayhole Attacks in
AODV. In this method PEAK value are allocated
in memory. The Number of Sent Request and
Number of Receive Reply are used for calculation
of PEAK value. Here malicious node is detects
using PEAK value. Here maintain malicious node
list in the routing table and only RREQ is used to
notify other nodes in the network about malicious
nodes.

[5] Conclusion
Black Hole attack is type of attack in the mobile
ad-hoc network which is to drop or eavesdrop the
message while route discovery. Black hole node
sends fake RREP to a sender node that initiates
route discovery, and receives data packets from the
source node. Many Methods are described different
solution for prevention and detection of black hole
attack. Various methods like secure route
discovery, modification of protocol, Using Route
Legitimacy value attached with RREP, Route
authentication, RREP Caching mechanism, Data
Routing Information, Timer based detection
mechanism, Trust scheme are surveyed. These are
methods to protect against black hole attacks which
give some improved result when black hole attack
is launched.
References
[1] Siddiqua, Ayesha, Kotari Sridevi, and Arshad
Ahmad Khan Mohammed. "Preventing black hole
attacks in MANETs using secure knowledge
algorithm." Signal Processing And Communication
Engineering Systems (SPACES), 2015 International
Conference on. IEEE, 2015.
[2] Bhandare, A. S., and S. B. Patil. "Securing MANET
against Co-operative Black Hole Attack and Its
Performance Analysis-A Case Study." Computing
Communication
Control
and
Automation

Page 537

Imperial Journal of Interdisciplinary Research (IJIR)


Vol-2, Issue-4, 2016
ISSN: 2454-1362, http://www.onlinejournal.in
(ICCUBEA), 2015 International Conference on.
IEEE, 2015.

[3] Choudhary, Nidhi, and Lokesh Tharani. "Preventing


black hole attack in AODV using timer-based
detection mechanism." Signal processing and
communication engineering systems (SPACES),
2015 international conference on. IEEE, 2015.

[4] Dorri, Ali, and Hamed Nikdel. "A new approach for
detecting and eliminating cooperative black hole
nodes in MANET." Information and Knowledge
Technology (IKT), 2015 7th Conference on. IEEE,
2015.
[5] Chauhan, R. K. "An assessment based approach to
detect black hole attack in MANET." Computing,
Communication & Automation (ICCCA), 2015
International Conference on. IEEE, 2015.
[6] Jain, Ashish Kumar, and Vrinda Tokekar.
"Mitigating the effects of Black hole attacks on
AODV routing protocol in Mobile Ad hoc
Networks." Pervasive computing (ICPC), 2015
international conference on. IEEE, 2015.
[7] Kumar, Raushan, Abdul Quyoom, and Devki
Nandan Gouttam. "To mitigate black hole attack in
AODV." Next Generation Computing Technologies
(NGCT), 2015 1st International Conference on.
IEEE, 2015.
[8] Aware, Anand A., and Kiran Bhandari. "Prevention
of Black hole Attack on AODV in MANET using
hash function." Reliability, Infocom Technologies
and Optimization (ICRITO)(Trends and Future
Directions), 2014 3rd International Conference on.
IEEE, 2014.
[9] Dave, Dhaval, and Pranav Dave. "An effective
Black hole attack detection mechanism using
Permutation Based Acknowledgement in MANET."
Advances in Computing, Communications and
Informatics
(ICACCI,
2014
International
Conference on. IEEE, 2014.
[10] Patidar, Kriti, and Vandana Dubey. "Modification in
routing mechanism of AODV for defending
blackhole and wormhole attacks." IT in Business,
Industry and Government (CSIBIG), 2014
Conference on. IEEE, 2014.
[11] Kshirsagar, Vishvas, Ashok M. Kanthe, and Dina
Simunic. "Analytical approach towards packet drop
attacks in mobile ad-hoc networks." Computational
Intelligence and Computing Research (ICCIC),
2014 IEEE International Conference on. IEEE,
2014.
[12] Wahane, Gayatri, Ashok M. Kanthe, and Dina
Simunic. "Detection of cooperative black hole
attack using crosschecking with truelink in
MANET."
Computational
Intelligence
and

Imperial Journal of Interdisciplinary Research (IJIR)

Computing Research (ICCIC), 2014


International Conference on. IEEE, 2014.

IEEE

[13] Cai, Ruo Jun, Peter Han Joo Chong, and Cherry Ye
Aung.
"Poster:
Trust-based
routing
with
neighborhood connectivity to prevent single and
colluded active black hole." Communications and
Networking in China (CHINACOM), 2014 9th
International Conference on. IEEE, 2014.
[14] Bhardwaj, Arpit. "Secure routing in DSR to mitigate
black hole attack." Control, Instrumentation,
Communication and Computational Technologies
(ICCICCT), 2014 International Conference on.
IEEE, 2014.
[15] Singh, Harsh Pratap, and Rashmi Singh. "A
mechanism for discovery and prevention of
coopeartive black hole attack in mobile ad hoc
network using AODV protocol." Electronics and
Communication
Systems
(ICECS),
2014
International Conference on. IEEE, 2014.
[16] Syed, U-H., Arif Iqbal Umar, and Fahad Khurshid.
"Avoidance of Black hole affected routes in AODVbased MANET." Open Source Systems and
Technologies (ICOSST), 2014 International
Conference on. IEEE, 2014.
[17] Tan, Siew-Chong, and Keecheon Kim. "Secure
Route Discovery for preventing black hole attacks
on AODV-based MANETs." High Performance
Computing and Communications & 2013 IEEE
International Conference on Embedded and
Ubiquitous Computing (HPCC_EUC), 2013 IEEE
10th International Conference on. IEEE, 2013.
[18] Rani, Jyoti, and Narendra Kumar. "Improving
AOMDV protocol for black hole detection in
Mobile Ad hoc Network." Control Computing
Communication & Materials (ICCCCM), 2013
International Conference on. IEEE, 2013.
[19] Kshirsagar, Durgesh, and Abhijit Patil. "Blackhole
attack detection and prevention by real time
monitoring." Computing, Communications and
Networking Technologies (ICCCNT), 2013 Fourth
International Conference on. IEEE, 2013.
[20] Jhaveri, Rutvij H. "MR-AODV: A solution to
mitigate blackhole and grayhole attacks in AODV
based MANETs." Advanced Computing and
Communication Technologies (ACCT), 2013 Third
International Conference on. IEEE, 2013.
[21] Jose, Jubil, and C. R. Rigi. "A comparative study of
topology enabled and topology hiding multipath
routing protocols in MANETs." Electrical,
Electronics,
Signals,
Communication
and
Optimization
(EESCO),
2015
International
Conference on. IEEE, 2015.
[22] Chavda, Ketan S., and Ashish V. Nimavat.
"Removal of black hole attack in AODV routing
protocol of MANET." Computing, Communications

Page 538

Imperial Journal of Interdisciplinary Research (IJIR)


Vol-2, Issue-4, 2016
ISSN: 2454-1362, http://www.onlinejournal.in
and Networking Technologies (ICCCNT), 2013
Fourth International Conference on. IEEE, 2013.
[23] Kumar Arora, Sandeep, et al. "Performance
measurement in MANET." Confluence The Next
Generation Information Technology Summit
(Confluence), 2014 5th International Conference-.
IEEE, 2014.
[24] Ranjan, Rakesh, Nirnemesh Kumar Singh, and Ajay
Singh. "Security issues of black hole attacks in
MANET."
Computing,
Communication
&
Automation
(ICCCA),
2015
International
Conference on. IEEE, 2015.
[25] Kishor Jyoti Sarma, Rupam Sharma, Rajdeep Das,
A Survey of Black Hole Attack Detection in
Manet. IEEE, 2014

Imperial Journal of Interdisciplinary Research (IJIR)

Page 539

Table 1. Literature Survey for Prevention and Detection of Black hole Attack

Sr
.
N
o

Author

Paper Title

Method Name

Protocol

Tool

Prevention
/
Detection

Remark

Ayesha
Siddiqua
et. al.[1]

Preventing Black
Hole Attacks in
MANETs
Using Secure
Knowledge
Algorithm

Secure
Knowledge
Algorithm

AODV

NS-2.35

Yes/Yes

Miss
Bhandare
A.S. et.
al.[2]

Malicious Node
Detection System

AODV

NS-2.35

Yes/Yes

Nidhi
Choudhar
y et. al.[3]

Timer-Based
Detection
Mechanism

AODV

EXatacyber

Yes/Yes

Ali Dorri
et. al.[4]

Securing MANET
against Cooperative Black
Hole
attack and its
performance
analysis-A case
study
Preventing Black
Hole Attack in
AODV using
Timer-Based
Detection
Mechanism
A New Approach
for Detecting and
Eliminating
Cooperative
Black hole Nodes
in MANET

Data Routing
Information

AODV

Opnet
14.5

No/Yes

Pooja et.
al.[5]

An Assessment
Based Approach
to
Detect Black hole
Attack in
MANET

Local utility
function based
scheme

Hint-based
Probabilisti
c routing
protocol

ONE
1.5.1RC2 Java
Based
simulator

NO/Yes

This Method only


Detect the Black
hole Attack, it cant
eliminate and
prevent from a
network.

Ashish
Kumar
Jain et.
al.[6]

Mitigating the
Effects of Black
hole Attacks on
AODV Routing
Protocol in
Mobile Ad Hoc
Networks

RREP caching
mechanism

AODV

NS-2

Yes/Yes

Raushan
Kumar et.
al.[7]

To Mitigate Black
Hole Attack in
AODV

Secure Route
Discovery

AODV

NS-2

Yes/Yes

Anand A.
Aware et.
al.[8]

Prevention of
Black hole Attack
on AODV in
MANET using

Using Hash
Function

AODV

NS-2

Yes/Yes

Proposed Method
19% Result
improved in Black
hole Attack AODV
routing protocol.
RREP caching
mechanism to
overcome the
problem of black
hole attack.
Proposed Method
increase the PDR
for three different
environments with
node mobility.
Proposed Method
for
detection/preventio
n of Black hole,

Imperial Journal of Interdisciplinary Research (IJIR)

In Network if any
node drops the
packet, Algorithm
checks for the
packet drop
reasons. The
Algorithm used
Promiscuous mode
to monitor nodes
activity.
Packet
Modification is
required. No extra
Overhead required.

Proposed Approach
gives better Packet
Delivery Ratio
than AODV and
Black hole Attack
AODV
This Method takes
less overhead and
processing timing
to eliminate the
Black hole attack
with False Positive
detection from the
network by using
TCP
connections.

Page 540

hash function

Dhaval
Dave et.
al.[9]

An Effective
Black Hole
Attack Detection
Mechanism using
Permutation
Based
Acknowledgemen
t in MANET

Permutation
Based
Acknowledgemen
t

AOMSR

NS-2

No/Yes

10

Kriti
Patidar et.
al.[10]

Modification in
Routing
Mechanism of
AODV for
Defending
Blackhole and
Wormhole
Attacks

Intrusion
Detection System
based on the
concept of
SpecificationBased
Detection System

AODV

NS-2.35

Yes/Yes

11

Vishvas
Kshirsagar
et. al.[11]

Analytical
Approach towards
Packet Drop
Attacks in
Mobile Ad-hoc
Networks

Bayes Theorem
and Prior
probability

AODV

12

Gayatri
Wahane
et. al.[12]

Detection of
Cooperative
Black Hole
Attack
using
Crosschecking
with TrueLink in
MANET

crosschecking
with True-Link
(timing based
countermeasure)
concept

AODV

NS-2

Yes/Yes

13

Ruo Jun
Cai et.
al.[13]

Poster: Trustbased Routing


with
Neighborhood
Connectivity to
Prevent Single
and Colluded
Active

Trust Scheme
(Neighbourhood
Connectivity
Based Trust)

DSR

NS-2

Yes/Yes

Imperial Journal of Interdisciplinary Research (IJIR)

No/yes

cooperative black
hole and grey hole
attack. It will select
optimal path and
authenticate packet
using SHA
algorithm.
Some Assumption
is made for
proposed scheme.
This method gives
high throughput,
less overhead as
compares to
AODV.
This method detects
a hop count
analysis approach
to detect wormhole
attacks along routes
in ad hoc networks.
The proposed
protocol does not
require any location
information, time
synchronization, or
special hardware to
detect wormhole
attacks.
Analysis approach
to identify packet
drop attack.
Proposed method
finds the un-trusted
node from the
network, if any untrusted node found,
the performance of
the network can be
improved by
eliminate that node
True-Linkcrosschecking
enhances AODV
protocol to improve
the network
performance
according to
routing update
condition. This
solution reduces
routing overhead,
delay and
maximum
throughput when
number of nodes
and pause time
more.
This Method is
requires every node
to exchange
neighbour
information
regularly by
sending Hello
message and then

Page 541

Black Hole

14

Ashutosh
Bhardwaj
et. al.[14]

15

Harsh
Pratap
Singh et.
al.[15]

16

Ume-Rani
Syed et.
al.[16]

17

Seryvuth
Tan et.
al.[17]

18

Jyoti Rani
et. al.[18]

19

Durgesh
Kshirsagar
et. al.[19]

20

Ketan S.
Chavda et.
al.[20]

21

Rutvij H.
Jhaveri
et. al.[21]

use before collected


neighbourhood
topology to verify
received
route reply.
Proposed Scheme
uses promiscuous
mode.

Secure Routing in
DSR to Mitigate
Black Hole
Attack
A Mechanism for
Discovery and
Prevention of
Cooperative
Black hole attack
in Mobile Ad hoc
Network Using
AODV Protocol

Authentication of
route

DSR

NS-2.35

Yes/Yes

Broadcast
Synchronization
and Relative
Distance method
of clock
synchronization

AODV

NS-2.34

Yes/Yes

Avoidance of
Black hole
Affected Routes
in AODV Based
MANET
Secure Route
Discovery for
Preventing Black
Hole
Attacks on
AODV-based
MANETs

Using Route
Legitimacy value
attached with
RREP

AODV

NS-2

Yes/Yes

Secure Route
Discovery

AODV

NS-2

Yes/Yes

Improving
AOMDV
Protocol for Black
Hole
Detection in
Mobile Ad hoc
Network
Blackhole Attack
Detection and
Prevention by
Real Time
Monitoring
Removal of Black
Hole Attack In
AODV Routing
Protocol of
MANET
MR-AODV: A
Solution to
Mitigate
Blackhole and
Grayhole Attacks
in AODV Based
MANETs

Modification in
RREQ, RREP and
Routing Table

AOMDV

MATLA
B

No/Yes

Real
Time Monitoring

AODV

NS-2.34

Yes/Yes

This Method Used


Promiscuous mode
for monitoring
purpose.

Sequence number
of RREP message

AODV

NS-2

Yes/Yes

AODV

NS-2

Yes/Yes

Proposed method
achieves a
considerable
rise in PDR and
Throughput
This method
detection and
isolation of
multiple malicious
nodes during route
discovery process
and discovers a
short and secure
route to destination
without extra
control packets

Imperial Journal of Interdisciplinary Research (IJIR)

Proposed scheme
for detection
process is sometime
failed in the clock
synchronization. In
this case this
proposed another
method for black
hole detection using
Relative Velocity
distance
Just Proposed
Scheme, yet not
implemented.

Based on Threshold
environment
proposed method
compare the RREQ
and RREP
sequence no for
mitigating Black
hole Attack.
This Method cant
detect Grayhole
Attack

Page 542

You might also like