Analysis And Detection Of Black Hole Attack In MANET
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013

Analysis And Detection Of Black Hole Attack In MANET

Swati Saini, Vinod Saroha

An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this paper a mechanism based on FUZZY LOGIC is proposed to detect the black hole attack in MANET with AODV protocol. An introduction of black hole in MANET with NS2 (2.35) is done, after applying the detection technique result reflects the performance. This paper is intended for audience having prior knowledge about network routing protocols and its related quantitative performance metrics.

Keywords: Ad hoc Network, Black hole Attack, AODV, NS235, Detection Technique

Edition: Volume 2 Issue 5, May 2013

Pages: 234 - 237

Share this Article

How to Cite this Article?

Swati Saini, Vinod Saroha, "Analysis And Detection Of Black Hole Attack In MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON1201359, Volume 2 Issue 5, May 2013, 234 - 237

58 PDF Views | 47 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Ad hoc Network'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2021 - 2024

An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs

Mohan Babu G, S Balaji

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this Article

Similar Articles with Keyword 'Black hole Attack'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2021 - 2024

An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs

Mohan Babu G, S Balaji

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this Article

Similar Articles with Keyword 'AODV'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this Article

Similar Articles with Keyword 'Detection Technique'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1680 - 1683

A Review of Diverse Pitch & Detection Methods

Shikha Rani, Nitin Jain

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1984 - 1987

Automatic VOE Techniques using CRF and Visual Saliency Method

Dr. Swathi. K, Sivabalan.T, Vijayanathan.R

Share this Article
Top