Black hole attack's effect mobile ad-hoc networks (MANET)

Ad-hoc network can be defined as a collection of number of mobile nodes which makes a temporary network. Black hole can be defined as a malicious node which on any request of route replies in an incorrect manner as if it has new route to the goal and then it drops all incoming packets. Loss will be very high if malicious nodes work collectively. This attack can be defined as cooperative black hole attack. This paper gives the analysis of Black Hole ADOV performance by frequently changing number of mobile nodes and by also changing black hole nodes. To analyze this various performance metrics are used which includes average end to end delay, loss of packet and packet delivery ratio and It has been seen that effect on end to end delay is higher that on loss of packet.

[1]  Mehdi Medadian,et al.  Combat with Black hole attack in AODV routing protocol in MANET , 2009, 2009 First Asian Himalayas International Conference on Internet.

[2]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[3]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[4]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[5]  Kurnool,et al.  Prevention of Black Hole Attack in MANET , 2015 .

[6]  Chang-Wu Yu,et al.  A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks , 2007, PAKDD Workshops.

[7]  Roopam Gupta,et al.  Simulation Study Of Blackhole Attack in the Mobile Ad hoc Networks ” , 2008 .

[8]  Sunil Kumar,et al.  Security Issues in Mobile Ad Hoc Networks: A Survey , 2016 .

[9]  Nishu Garg,et al.  MANET Security Issues , 2009 .

[10]  Pooch,et al.  Detecting Blackhole Attack in Mobile Ad Hoc Networks , 2005 .

[11]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[12]  S. Muknahallipatna,et al.  Fibre Channel Switch Modeling at Fibre Channel-2 Level for Large Fabric Storage Area Network Simulations using OMNeT++ , 2007 .

[13]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[14]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .

[15]  Kamanashis Biswas,et al.  Security Threats in Mobile Ad Hoc Network , 2007 .

[16]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[17]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[18]  Chen Wei,et al.  A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[19]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[20]  Nelson L. S. da Fonseca Fourth quarter 2009 IEEE communications surveys and tutorials , 2009 .

[21]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[22]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[23]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[24]  T Poongothai,et al.  A NONCOOPERATIVEGAME APPROACH FOR INTRUSION DETECTIONIN MOBILE ADHOC NETWORKS , 2008 .

[25]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[26]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[27]  Jens Tölle,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .