International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013

Analysis And Detection Of Black Hole Attack In MANET

Swati Saini, Vinod Saroha

An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this paper a mechanism based on FUZZY LOGIC is proposed to detect the black hole attack in MANET with AODV protocol. An introduction of black hole in MANET with NS2 (2.35) is done, after applying the detection technique result reflects the performance. This paper is intended for audience having prior knowledge about network routing protocols and its related quantitative performance metrics.

Keywords: Ad hoc Network, Black hole Attack, AODV, NS235, Detection Technique

Edition: Volume 2 Issue 5, May 2013

Pages: 234 - 237


How to Cite this Article?

Swati Saini, Vinod Saroha, "Analysis And Detection Of Black Hole Attack In MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON1201359, Volume 2 Issue 5, May 2013, 234 - 237

27 PDF Views | 20 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Ad hoc Network'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3268 - 3272

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

Bhagyashri Thakre, Archana Raut

Share this article

Similar Articles with Keyword 'Black hole Attack'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1956 - 1959

Performance Analysis of Black Hole Attack with AODV using Different No. of Nodes in VANET

Bharti, D. P. Dwivedi

Share this article

Similar Articles with Keyword 'AODV'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1295 - 1298

Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique

Sumiti, Dr. Sumit Mittal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1717 - 1722

Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari

Share this article

Similar Articles with Keyword 'Detection Technique'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1680 - 1683

A Review of Diverse Pitch & Detection Methods

Shikha Rani, Nitin Jain

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2352 - 2355

Spam Detection Techniques: A Review

Reena Sharma, Gurjot Kaur

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1852 - 1856

Survey on Outlier Pattern Detection Techniques for Time-Series Data

Archana N., S. S. Pawar

Share this article

Research Paper, Computer Science & Engineering, Nigeria, Volume 4 Issue 4, April 2015

Pages: 3158 - 3161

Vehicle License Plate Recognition Using Edge Detection and Neural Network

Arulogun Oladiran Tayo, Amusan Damilare Gideon

Share this article

Top