Black Hole Attack in MANETs Preventions and Advancements: A Review

A network is a system in which two or more than two computer systems are linked together with wires or without wires. Mobile Ad-Hoc networks (MANETs) are self-directed and distributed networks. MANETs consists of mobile nodes that are free to move in and out of the network. Nodes may be mobile phones, laptops, PCs, Printers, mp3 players, iPods etc. that participate in the network. Any of these nodes can act as a host/router or it can act both at the same time. They can form different topologies depending on their connectivity with each other in the network. These nodes can configure themselves since they have self-configuration ability. They can be deployed into the network at any time as they do not need any infrastructure. Development of various types of routing protocols has occurred in the recent past. Due to their dynamic topology, no infrastructure and no central management system MANETs are vulnerable to various security attacks. In this paper we have proposed a solution to detect and prevent multiple Black Holes in a network and find a secure way to transfer data from source to destination node.

[1]  Supriya Tayal,et al.  A Survey of Attacks on Manet Routing Protocols , 2013 .

[2]  Subrat Kar,et al.  BAAP: Blackhole attack avoidance protocol for wireless network , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[3]  M Tech,et al.  A Review on Security Issues of Routing Protocols in Mobile Ad-Hoc Networks , 2012 .

[4]  Al-Sakib Khan Pathan,et al.  Performance Analysis of MANET Routing Protocols Using An Elegant Visual Simulation Tool , 2009, ArXiv.

[5]  Rajib Ghosh,et al.  An Alternative Approach to Detect Presence of Black Hole Nodes in Mobile Ad-Hoc Network Using Artificial Neural Network , 2013 .

[6]  K. Jayanthi,et al.  Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting , 2012 .

[7]  Detection of Blackhole Attack using AODV Protocol in MANET , 2014 .

[8]  Shree Om,et al.  Using Merkle Tree to Mitigate Cooperative Black- hole Attack in Wireless Mesh Networks , 2011 .

[9]  Sandeep B. Vanjale,et al.  Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks , 2010 .

[10]  Mukesh Zaveri,et al.  Improving AODV Protocol against Blackhole Attacks , 2010 .

[11]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[12]  Nisha P. John,et al.  Prevention and Detection of Black Hole Attack in AODV based Mobile Ad-hoc Networks - A Review , 2012 .

[13]  Neha,et al.  MULTICAST ROUTING PROTOCOLS IN MANETS , 2012 .

[14]  Vimal Bibhu,et al.  Preventive Aspect of Black Hole Attack in Mobile AD HOC Network , 2012 .

[15]  G. V. Kumar,et al.  Current Research Work on Routing Protocols for MANET: A Literature Survey , 2010 .

[16]  Anish Arora,et al.  Security Issues of Routing Protocols in MANETs , 2012, BIOINFORMATICS 2012.

[17]  Amravati Sgbau,et al.  A Survey on Secure Routing Protocols in MANETs , 2018 .

[18]  A. L. Sangal,et al.  Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model , 2010 .

[19]  T Rakesh,et al.  Detection and Prevention of Blackhole Attack in MANET Using ACO , 2012 .

[20]  Daya Gupta,et al.  Effect of Black Hole Attack on MANET Routing Protocols , 2013 .

[21]  Kanika Bawa,et al.  Prevention of Black Hole Attack in MANET using Addition of Genetic Algorithm to Bacterial Foraging Optimization , 2015 .

[22]  K. Thamizhmaran,et al.  Performance Analysis of Secure Routing Protocols in MANET , 2012 .