Analysis And Detection Of Black Hole Attack In MANET
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 144 , Downloads: 116 | CTR: 81 % | Weekly Popularity: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013

Analysis And Detection Of Black Hole Attack In MANET

Swati Saini, Vinod Saroha

An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this paper a mechanism based on FUZZY LOGIC is proposed to detect the black hole attack in MANET with AODV protocol. An introduction of black hole in MANET with NS2 (2.35) is done, after applying the detection technique result reflects the performance. This paper is intended for audience having prior knowledge about network routing protocols and its related quantitative performance metrics.

Keywords: Ad hoc Network, Black hole Attack, AODV, NS235, Detection Technique

Edition: Volume 2 Issue 5, May 2013

Pages: 234 - 237

Share this Article

How to Cite this Article?

Swati Saini, Vinod Saroha, "Analysis And Detection Of Black Hole Attack In MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON1201359, Volume 2 Issue 5, May 2013, 234 - 237

144 PDF Views | 116 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Ad hoc Network'

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 143 , Downloads: 78 | CTR: 55 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 147 , Downloads: 84 | CTR: 57 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'Black hole Attack'

Views: 138 , Downloads: 104 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Views: 133 , Downloads: 104 | CTR: 78 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Views: 151 , Downloads: 106 | CTR: 70 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Views: 173 , Downloads: 106 | CTR: 61 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

A MANET Security Using Routing Methodology

Shirsty Chandel, Prof. Ashish Tiwari

Share this Article

Views: 131 , Downloads: 106 | CTR: 81 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1815 - 1819

Survey on Secure and Reliable Data Routing in WSN

Trupti Anil Bomble, M. D. Ingle

Share this Article

Similar Articles with Keyword 'AODV'

Views: 143 , Downloads: 78 | CTR: 55 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 145 , Downloads: 102 | CTR: 70 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Views: 138 , Downloads: 104 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Views: 133 , Downloads: 104 | CTR: 78 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Views: 115 , Downloads: 105 | CTR: 91 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Similar Articles with Keyword 'Detection Technique'

Views: 135 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Views: 146 , Downloads: 102 | CTR: 70 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Views: 138 , Downloads: 104 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Views: 128 , Downloads: 104 | CTR: 81 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1852 - 1856

Survey on Outlier Pattern Detection Techniques for Time-Series Data

Archana N., S. S. Pawar

Share this Article

Views: 136 , Downloads: 106 | CTR: 78 %

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1271 - 1274

Digital Image Forgery Detection with Motion Blur as Cue: A Survey

Pornima M. Birajdar, N.G. Dharashive

Share this Article
Top