An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are infrastructure less. A black hole is a malicious node that incorrectly replies the route requests that it has a fresh route to destination and then it drops all the receiving packets. The damage will be serious if malicious nodes work together as a group. This type of attack is called cooperative black hole attack. This paper includes the behavior of the Black Hole node studied by considering different scenarios. Performance of the Black Hole ADOV protocol has been analyzed by varying the number of mobile nodes and black hole nodes. The protocol is analyzed on various performance metrics like packet loss, packet delivery ratio and average end to end delay. It is observed that the effect on packet loss is much lower as compare to effect on delay. I. Introduction Ad hoc network [1] is a wireless network without having any fixed infrastructure. Each mobile node in an ad hoc network moves arbitrarily and acts as both a router and a host. A wireless ad-hoc network consists of a collection of "peer" mobile nodes that are capable of communicating with each other without help from a fixed infrastructure. The interconnections between nodes are capable of changing on a continual and arbitrary basis. Nodes within each other's radio range communicate directly via wireless links, while those that are far apart use other nodes as relays. Nodes usually share the same physical media; they transmit and acquire signals at the same frequency band. However, due to their inherent characteristics of dynamic topology and lack of centralized management security, MANET is vulnerable to various kinds of attacks. Black hole attack [2] is one of many possible attacks in MANET. Black hole attack can occur when the malicious node on the path directly attacks the data traffic and intentionally drops, delay or alter the data traffic passing through it. This attack can be easily lessen by setting the promiscuous mode of each node and to see if the next node on the path forward the data traffic as expected. Another type of black hole attack is to attack routing control traffic.
[1]
B.Manimekala.
ROUTING SECURITY IN WIRELESS ADHOC NETWORKS
,
2019
.
[2]
Seong-Moo Yoo,et al.
Black hole attack in mobile Ad Hoc networks
,
2004,
ACM-SE 42.
[3]
Chang-Wu Yu,et al.
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks
,
2007,
PAKDD Workshops.
[4]
Prashant B. Swadas,et al.
Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet
,
2009,
ArXiv.
[5]
Udo W. Pooch,et al.
Detecting black-hole attack in mobile ad hoc networks
,
2003
.
[6]
Kurnool,et al.
Prevention of Black Hole Attack in MANET
,
2015
.
[7]
Huirong Fu,et al.
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
,
2003,
International Conference on Wireless Networks.
[8]
Nei Kato,et al.
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
,
2007,
Int. J. Netw. Secur..