Skip to main content

A Novel Security Approach for Detecting Black Hole Attack in MANET

  • Conference paper
Information Processing and Management (BAIP 2010)

Abstract

A mobile ad hoc network (MANETs) consists of a group of mobile nodes which are connected by wireless links. The peculiar characteristics of MANET like open medium, high dynamic nature of the network lead to various attacks which partition or destroy entire network. A black hole attack can be working in opposition to routing in mobile adhoc networks. A black hole node is a malicious node which sends the fake reply for route requests and drops the packets. In this paper, a novel approach is proposed to detect blackhole nodes in the MANET. Our solutions find out the safe route between sending node and receiving node. The simulations show that the proposed approach is efficient than normal AODV when the black hole attack is present with high packet delivery and less packet drop.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security 5(3), 338–346 (2007)

    Google Scholar 

  2. Sankaranarayanan, V., Tamilselvan, L.: Prevention of Blackhole Attack in MANET. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications. IEEE, Los Alamitos (2007)

    Google Scholar 

  3. Shurman, M.A., Yoo, S.M., Park, S.: Black hole attack in wireless ad hoc networks. In: ACM 42nd Southeast Conference (ACMSE 2004), April 2004, pp. 96–97 (2004)

    Google Scholar 

  4. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. In: Proceedings of the International Conference on Wireless Networks (June 2003)

    Google Scholar 

  5. Deng, H., Li, W., Agrawal, D.P.: Routing security in ad hoc networks. IEEE Communications Magazine 40(10), 70–75 (2002)

    Article  Google Scholar 

  6. Lee, S., Han, B., Shin, M.: Robust routing in wireless ad hoc networks. In: ICPP Workshops, p. 73 (2002)

    Google Scholar 

  7. Patcha, A., Mishra, A.: Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks. IEEE, Los Alamitos (2006)

    Google Scholar 

  8. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th MobiCom, Boston, Massachusetts (August 2000)

    Google Scholar 

  9. Ramaswami, S.S., Upadhyaya, S.: Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing. In: Workshop on Information Assurance Proceedings. IEEE, Los Alamitos (2006)

    Google Scholar 

  10. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: EPMCC. IEEE, Los Alamitos (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jaisankar, N., Saravanan, R., Swamy, K.D. (2010). A Novel Security Approach for Detecting Black Hole Attack in MANET. In: Das, V.V., et al. Information Processing and Management. BAIP 2010. Communications in Computer and Information Science, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12214-9_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12214-9_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12213-2

  • Online ISBN: 978-3-642-12214-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics