International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013


Analysis And Detection Of Black Hole Attack In MANET

Swati Saini, Vinod Saroha


Abstract: An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this paper a mechanism based on FUZZY LOGIC is proposed to detect the black hole attack in MANET with AODV protocol. An introduction of black hole in MANET with NS2 (2.35) is done, after applying the detection technique result reflects the performance. This paper is intended for audience having prior knowledge about network routing protocols and its related quantitative performance metrics.


Keywords: Ad hoc Network, Black hole Attack, AODV, NS235, Detection Technique


Edition: Volume 2 Issue 5, May 2013,


Pages: 234 - 237


How to Cite this Article?

Swati Saini, Vinod Saroha, "Analysis And Detection Of Black Hole Attack In MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=IJSRON1201359, Volume 2 Issue 5, May 2013, 234 - 237

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Ad hoc Network'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Black hole Attack'

Downloads: 105

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Similar Articles with Keyword 'AODV'

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Similar Articles with Keyword 'Detection Technique'

Downloads: 4 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 866 - 868

Detecting and Blocking of Malicious URL

Muskan V. Jaiswal, Anjali B. Raut

Share this Article

Similar Articles with Keyword 'Ad'

Downloads: 176 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 144 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Similar Articles with Keyword 'hoc'

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Network'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'Black'

Downloads: 4 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 866 - 868

Detecting and Blocking of Malicious URL

Muskan V. Jaiswal, Anjali B. Raut

Share this Article

Similar Articles with Keyword 'hole'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Similar Articles with Keyword 'Attack'

Downloads: 134 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article
Top