Black Hole Attacks in Mobile Ad Hoc Networks

Mobile ad hoc networks are used on different occasions, especially during crises. In risk and crisis management, communications is considered vital. With regard to their features, mobile ad hoc networks can be very helpful when dealing with a crisis such as flood, earthquake, war, etc. Security is nowadays considered as one of the main concerns in mobile ad hoc networks. And blac khole attack is among the most important threats of mobile ad hoc networks, where the malicious node places itself along the route by deceiving other nodes and then drops data packets. This paper attempted to investigate a number of proposed solutions against blac khole attacks.

___

  • Y.F. Alem and Z.C. Xuan, Preventing Black Hole Attack in Mobile Ad-Hoc Networks Using Anomaly Detection, Proceedings of the International Conference on Future Computer and Communication (ICFCC), 2010, Volume: 3, pp: 672-676.
  • S. Banerjee and K. Majumder, A Survey of Black Hole Attacks and Countermeasures in Wireless Mobile Ad-Hoc Networks, Proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science, 2012, Volume: 335, pp: 396-407.
  • J. Ben Othman and L. Mokdad, Enhancing Data Security in Ad Hoc Networks based on Multipath Routing, Journal of Parallel and Distributed Computing 70 (2010) 309-316.
  • K. Chang and K.G. Shin, Application-Layer Intrusion Detection in MANETs, Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS), 2010, pp:1-10.
  • R. Chatterjee and M. Routray, Black Hole Combat Using Node Stability System in MANET, Signal Processing and Information Technology (2012) 249-254.
  • A. Esfandi, Efficient Anomaly Intrusion Detection System in Adhoc Networks by Mobile Agents, Proceedings of the 3rd International Conference on Computer Science and Information Technology (ICCSIT), IEEE 2010, Volume: 7, PP: 73-77.
  • N. Jaisankar, R. Saravanan and K.D. Swamy, A Novel Security Approach for Detecting Black Hole Attack in MANET, Information Processing and Management, (2010) 217-223.
  • R. Mahapatra, N. Garg, R. Sharma and P. Pal, Interaction Between Nodes in MANET, Proceedings of the International Conference on Computational Intelligence and Computing Research (ICCIC), IEEE 2010, pp: 1-5.
  • N. Mistry, D.C. Jinwala and M. Zaveri, Improving AODV Protocol Against Blackhole Attacks, Proceedings of the International Multi Conference of Engineers and Computer Scientists, 2010 Volume 2.
  • P. Moradiya and S. Sampalli, Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks, Proceedings of the International Conference on Embedded and Ubiquitous Computing, IEEE/IFIP 2010, pp: 542-547.
  • M. Kuchaki Rafsanjani, A.A. Khavasi and A. Movaghar, An efficient method for identifying IDS agent nodes by discovering compromised nodes in MANET, Proceedings of the Second International Conference on Computer and Electrical Engineering ICCEE'09, 2009, Volume:1, pp: 625-629.
  • R. Raja Mahmood and A. Khan, A Survey on Detecting Black Hole Attack in AODVBased Mobile Ad Hoc Networks, Proceedings of the International Symposium on High Capacity Optical Networks and Enabling Technologies, 2007, pp: 1-6.
  • S.A. Razak, S. Furnell, N.L. Clarke and P.J. Brooke, Friend-assisted Intrusion Detection and Response Mechanisms for Mobile Ad Hoc Networks, Ad Hoc Networks 6 (2008) 1151-1167.
  • M.A. Ritonga and M. Nakayama, Manager-Based Architecture in Ad Hoc Network Intrusion Detection System for Fast Detection Time, Proceedings of the International Symposium on Applications and the Internet SAINT, 2008, pp: 76-82.
  • M. Sayee Kumar, S. Selvarajan and S. Balu, ANODR Based Anomaly Detection for Black Hole and Route Disrupt Attacks, Proceedings of the International Conference on Computing, Communication and Networking, IEEE 2008, pp: 1-5.
  • S. Schuhmann and L. Volker, Combining Passive Autoconfiguration and AnomalyBased Intrusion Detection in Ad Hoc Networks, Proceedings of the Eighth International Workshop on Applications and Services in Wireless Networks, IEEE 2008, pp: 87-95.
  • F. Shi, W. Liu and D. Jin, Preventing Black hole Attack in DSR-Based Wireless Ad Hoc Networks, Computer Science and its Applications (2012) 953-969.
  • M. Shobana, R. Saranyadevi and S. Karthik, Geographic Routing Used in MANET for Black Hole Detection, Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, 2012, pp: 201-204.
  • M.Y. Su, Prevention of Selective Black Hole Attacks on Mobile Ad Hoc NetworksThrough Intrusion Detection Systems, Computer Communications 34 (2011) 107-117.
  • A. Taggu, TraceGray: An Application-layer Scheme for Intrusion Detection in MANET Using Mobile Agents, Proceedings of the Third International Conference on Communication Systems and Networks (COMSNETS), 2011, pp: 1-4.
  • K. Vishnu and A.J. Paul, Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile AdHoc Networks, International Journal of Computer Applications 1(2010) 40-44.
  • I. Woungang, S. Dhurandher, R. Peddi and M. Obaidat, Detecting Black Hole Attacks on DSR-based Mobile Ad Hoc Networks, Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS), 2012, pp: 1-5.
  • P. Yi, T. Zhu, N. Liu, Y. Wu and J. Li, Cross-layer Detection for Black Hole Attack in Wireless Network, Journal of Computational Information Systems 8 (2012) 4101-4109.