Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks

  • Muhammad Imran
  • Farrukh Aslam KhanEmail author
  • Haider Abbas
  • Mohsin Iftikhar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8629)


Mobile Ad hoc Networks (MANETs) are vulnerable to external threats due to their open access and lack of central point of administration. Black hole attack is a well-known routing attack, in which an attacker node replies to the Route Requests (RREQs) by pretending itself as a neighbor of the destination node in order to get the data. These days, it has become very challenging to secure a network from such attacks. In this paper, we propose a Detection and Prevention System (DPS) to detect black hole attack in MANETs. For this purpose, we deploy some special nodes in the network called DPS nodes, which continuously monitor RREQs broadcasted by other nodes. DPS nodes detect the malicious nodes by observing the behavior of their neighbors. When a node with suspicious behavior is found, DPS node declares that suspicious node as black hole node by broadcasting a threat message. Hence, the black hole node is isolated from the network by rejecting all types of data from it. The simulations in NS-2 show that our proposed DPS mechanism considerably reduces the packet drop ratio with a very low false positive rate.



This work was supported by the Research Center of College of Computer and Information Sciences, King Saud University, through Grant Number RC131028. The authors are grateful for this support.


  1. 1.
    Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1999), New Orleans, LA, USA, pp. 90–100 (1999)Google Scholar
  2. 2.
    Mohebi, A., Scott, S.: A survey on detecting black-hole methods in mobile ad hoc networks. Int. J. Innovative Ideas. 13(2), 55–63 (2013)Google Scholar
  3. 3.
    Mandala, S., Abdullah, A.H., Ismail, A.S., Haron, H., Ngadi, M.A., Coulibaly, Y.: A review of blackhole attack in mobile ad hoc network. In: 3rd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), Bandung, pp. 339–344 (2013)Google Scholar
  4. 4.
    Tseng, F.-H., Chou, L.-D., Chao, H.-C.: A survey of black hole attacks in wireless mobile ad hoc networks. Hum.-Centric Comput. Inf. Sci. 1(4), 1–16 (2011)Google Scholar
  5. 5.
    Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: International Conference on Wireless Networks (ICWN 2003), Las Vegas, Nevada, USA (2003)Google Scholar
  6. 6.
    Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int. J. Netw. Secur. 5(3), 338–346 (2007)Google Scholar
  7. 7.
    Tamilselvan, L., Sankaranarayanan, V.: Prevention of co-operative black hole attack in MANET. J. Netw. 3(5), 13–20 (2008)Google Scholar
  8. 8.
    Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. Int. J. Softw. Eng. Appl. 2(3), 39–54 (2008)Google Scholar
  9. 9.
    Su, M.-Y., Chiang, K.-L., Liao, W.-C.: Mitigation of black-hole nodes in mobile ad hoc networks. In: International Symposium on Parallel and Distributed Processing with Applications (ISPA), Taipei, Taiwan, pp. 162–167 (2010)Google Scholar
  10. 10.
    Gupta, S., Kar, S., Dharmaraja, S.: BAAP: blackhole attack avoidance protocol for wireless network. In: International Conference on Computer and Communication Technology (ICCCT), Allahabad, India, pp. 468–473 (2011)Google Scholar
  11. 11.
    Su, M.-Y.: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput. Commun. 34(1), 107–117 (2011)CrossRefGoogle Scholar
  12. 12.
    Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: A novel approach for GrayHole and BlackHole attacks in mobile ad-hoc networks. In: Second International Conference on Advanced Computing and Communication Technologies (ACCT), Haryana, India, pp. 556–560 (2012)Google Scholar
  13. 13.
    Chatterjee, N., Mandal, J.K.: Detection of blackhole behaviour using triangular encryption in NS2. In: 1st International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), Procedia Technology, vol. 10, pp. 524–529 (2013)Google Scholar
  14. 14.
    Tan, S., Kim, K.: Secure route discovery for preventing black hole attacks on AODV-based MANETs. In: International Conference on ICT Convergence (ICTC), Jeju, Korea, pp. 1027–1032 (2013)Google Scholar
  15. 15.
    Thachil, F., Shet, K.C.: A trust-based approach for AODV protocol to mitigate blackhole attack in MANET. In: International Conference on Computing Sciences (ICCS), Phagwara, pp. 281–285 (2012)Google Scholar
  16. 16.
    Zhang, X.Y., Sekiya, Y., Wakahara, Y.: Proposal of a method to detect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems, Athens, Greece, pp. 1–6 (2009)Google Scholar
  17. 17.
    Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)CrossRefGoogle Scholar
  18. 18.
    Kant, R., Gupta, S., Khatter, H.: A literature survey on black hole attacks on AODV protocol in MANET. Int. J. Comput. Appl. 80(16), 22–26 (2013)Google Scholar
  19. 19.
    Ehsan, H., Khan, F.A.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, pp. 1181–1187 (2012)Google Scholar
  20. 20.
    Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: IEEE Radio and Wireless Conference, Boston, MA, USA, pp. 75–78 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  • Muhammad Imran
    • 1
  • Farrukh Aslam Khan
    • 1
    • 2
    Email author
  • Haider Abbas
    • 2
    • 3
  • Mohsin Iftikhar
    • 4
  1. 1.Department of Computer ScienceNational University of Computer and Emerging SciencesIslamabadPakistan
  2. 2.Center of Excellence in Information Assurance (CoEIA)King Saud UniversityRiyadhSaudi Arabia
  3. 3.National University of Sciences and TechnologyIslamabadPakistan
  4. 4.Department of Computer ScienceCollege of Computer and Information Sciences, King Saud UniversityRiyadhSaudi Arabia

Personalised recommendations