International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013


Analysis And Detection Of Black Hole Attack In MANET

Swati Saini [2] | Vinod Saroha


Abstract: An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this paper a mechanism based on FUZZY LOGIC is proposed to detect the black hole attack in MANET with AODV protocol. An introduction of black hole in MANET with NS2 (2.35) is done, after applying the detection technique result reflects the performance. This paper is intended for audience having prior knowledge about network routing protocols and its related quantitative performance metrics.


Keywords: Ad hoc Network, Black hole Attack, AODV, NS235, Detection Technique


Edition: Volume 2 Issue 5, May 2013,


Pages: 234 - 237


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Swati Saini, Vinod Saroha, "Analysis And Detection Of Black Hole Attack In MANET", International Journal of Science and Research (IJSR), Volume 2 Issue 5, May 2013, pp. 234-237, https://www.ijsr.net/get_abstract.php?paper_id=IJSRON1201359

Similar Articles with Keyword 'Ad hoc Network'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [28]

Share this Article
Top