Detection of Black Hole Attacks in Mobile Ad Hoc Networks via HSA-CBDS Method

  • Ahmed Mohammed FahadEmail author
  • Abdulghani Ali Ahmed
  • Abdullah H. Alghushami
  • Sammer Alani
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 866)


Security is a critical problem in implementing mobile ad hoc networks (MANETs) because of their vulnerability to routing attacks. Although providing authentication to packets at each stage can reduce the risk, routing attacks may still occur due to the delay in time of reporting and analyzing the packets. Therefore, this authentication process must be further investigated to develop efficient security techniques. This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). Data are simulated and analyzed using MATLAB. The simulation results of HSA, DSR, and CBDS-DSR are provided. This study also evaluates the manner through which HSA can reduce the inherent delay of CBDS. The proposed approach detects and prevents malicious nodes, such as black hole attacks that are launched in MANETs. The results further confirm that the HSA performs better than CBDS and DSR.


Dynamic source routing Cooperative bait detection scheme Harmony search algorithm Black hole attack 



This work was supported by the Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang under FRGS Grant No. RDU160106 and RDU Grant No. RDU160365.


  1. 1.
    Vimala, S., Srivatsa, S.: Security using data compression in MANETS, pp. 528–531 (2017)Google Scholar
  2. 2.
    Taneja, S., Kush, A.: A survey of routing protocols in mobile ad hoc networks. Int. J. Innov. Manag. Technol. 1(3), 279 (2010)Google Scholar
  3. 3.
    Ahmed, A.A., Jantan, A., Wan, T.-C.: SLA-based complementary approach for network intrusion detection. Comput. Commun. 34(14), 1738–1749 (2011)CrossRefGoogle Scholar
  4. 4.
    Akbani, R., Korkmaz, T., Raju, G.: Mobile ad-hoc networks security. In: Recent Advances in Computer Science and Information Engineering, pp. 659–666. Springer, Berlin (2012) CrossRefGoogle Scholar
  5. 5.
    Ahmed, A.A., Sadiq, A.S., Zolkipli, M.F.: Traceback model for identifying sources of distributed attacks in real time. Secur. Commun. Netw. 9(13), 2173–2185 (2016)Google Scholar
  6. 6.
    Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: DoS attacks in mobile ad hoc networks: a survey, pp. 535–541 (2012)Google Scholar
  7. 7.
    Ullah, I., Rehman, S.U.: Analysis of black hole attack on MANETs using different MANET routing protocols (2010)Google Scholar
  8. 8.
    Goyal, P., Parmar, V., Rishi, R.: Manet: vulnerabilities, challenges, attacks, application. IJCEM Int. J. Comput. Eng. Manag. 11(2011), 32–37 (2011)Google Scholar
  9. 9.
    Jaiswal, R., Sharma, S.: A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network, pp. 499–504 (2013)Google Scholar
  10. 10.
    Bawa, K., Rana, S.B.: Prevention of black hole attack in MANET using addition of genetic algorithm to bacterial foraging optimization. Int. J. Curr. Eng. Technol. 5(4) (2015)Google Scholar
  11. 11.
    Tseng, F.-H., Chou, L.-D., Chao, H.-C.: A survey of black hole attacks in wireless mobile ad hoc networks. Human-Centric Comput. Inf. Sci. 1(1), 4 (2011)CrossRefGoogle Scholar
  12. 12.
    Chang, J.-M., Tsou, P.-C., Woungang, I., Chao, H.-C., Lai, C.-F.: Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst. J. 9(1), 65–75 (2015)CrossRefGoogle Scholar
  13. 13.
    Ahmed, A.A., Jantan, A., Wan, T.-C.: Real-time detection of intrusive traffic in QoS network domains. IEEE Secur. Priv. 11(6), 45–53 (2013)CrossRefGoogle Scholar
  14. 14.
    Chaudhary, A., Tiwari, V., Kumar, A.: A cooperative intrusion detection system for sleep deprivation attack using neuro-fuzzy classifier in mobile ad hoc networks. In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds.) Computational Intelligence in Data Mining, vol. 2, pp. 345–353. Springer, New Delhi (2015)Google Scholar
  15. 15.
    Bhandare, A., Patil, S.: Securing MANET against co-operative black hole attack and its performance analysis-a case study, pp. 301–305 (2015)Google Scholar
  16. 16.
    Choudhary, N., Tharani, L.: Preventing black hole attack in AODV using timer-based detection mechanism, pp. 1–4 (2015)Google Scholar
  17. 17.
    Bhardwaj, A.: Secure routing in DSR to mitigate black hole attack, pp. 985–989 (2014)Google Scholar
  18. 18.
    Wankhade, S.V.: 2ACK-scheme: routing misbehavior detection in manets using OLSR. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 1(5), 1–7 (2012)Google Scholar
  19. 19.
    Arya, P., Negi, G.P., Dhiman, P.K., Kapoor, K.: CBDS (Cooperative bait detection scheme) ATTACK—a review. Int. J. Adv. Res. Comput. Eng. Technol. 4, 3428–3434 (2015)Google Scholar
  20. 20.
    Assad, A., Deep, K.: Applications of harmony search algorithm in data mining: a survey, pp. 863–874 (2016)Google Scholar
  21. 21.
    Geem, Z.W.: Novel derivative of harmony search algorithm for discrete design variables. Appl. Math. Comput. 199(1), 223–230 (2008)MathSciNetzbMATHGoogle Scholar
  22. 22.
    Lee, K.S., Geem, Z.W.: A new meta-heuristic algorithm for continuous engineering optimization: harmony search theory and practice. Comput. Methods Appl. Mech. Eng. 194(36), 3902–3933 (2005)CrossRefGoogle Scholar
  23. 23.
    Geem, Z.W., Kim, J.H., Loganathan, G.V.: A new heuristic optimization algorithm: harmony search. Simulation 76(2), 60–68 (2001)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Ahmed Mohammed Fahad
    • 1
    Email author
  • Abdulghani Ali Ahmed
    • 1
  • Abdullah H. Alghushami
    • 2
  • Sammer Alani
    • 3
  1. 1.Faculty of Computer System & Software EngineeringUniversiti Malaysia PahangKuantanMalaysia
  2. 2.Information Technology DepartmentThe Community College of QatarDohaQatar
  3. 3.Faculty of Electronic and Computer Engineering (FKEKK)UTEM UniversityDurian TunggalMalaysia

Personalised recommendations