A Review on some aspects of Black Hole Attack in MANET

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-10 Number-8
Year of Publication : 2014
Authors : Ashis Bhattercharjee , Subrata Paul


Ashis Bhattercharjee , Subrata Paul. "A Review on some aspects of Black Hole Attack in MANET", International Journal of Engineering Trends and Technology (IJETT), V10(8),396-401 April 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group


A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack. The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. In this paper we presented a review on few aspects of Black hole attack in MANET’s. We have tried to discuss about the reasons why such attacks are seen in mobile ad- hoc networks and performed an analysis on its performance and result on a few of its simulation parameters.


[1]. Burbank JL, Chimento PF, Haberman BK, Kasch WT “Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology”. IEEE Communication Magazine 44(11):39–45,2009.
[2]. Abolhasan, M., Wysocki, T., Dutkiewicz, E: “A review of routing protocols for mobile ad hoc network”s. Elsevier, Amsterdam, 2004.
[3] Dokurer, S.; Erten Y.M., Acar. C.E., SoutheastCon Journal, “Performance analysis of ad-hoc networks under black hole attacks”. Proceedings IEEE Volume, Issue, 22-25 March 2007 Page(s):148 – 153.
[4] A. Shevtekar, K. Anantharam, and N. Ansari, “Low Rate TCP Denial-of-Service Attack Detection at Edge Routers,” IEEE Commun. Lett., vol. 9, no. 4, Apr. 2005, pp. 363–65.
[5] Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black hole Attack in Mobile Ad Hoc Networks” Proceedings of the 42nd annual Southeast regional conference ACM-SE 42, APRIL 2004, pp. 96-97.
[6] Y-C Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Sec. and Privacy, May–June 2004.
[7] K. Sanzgiri et al., “A Secure Routing Protocol for Ad Hoc Networks,” Proc. 2002 IEEE Int’l. Conf. Network Protocols, Nov. 2002.
[8] Sun B, Guan Y, Chen J, Pooch UW “Detecting Black-hole Attack in Mobile Ad Hoc Network”s. Paper presented at the 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22-25 April 2003
[9] Al-Shurman M, Yoo S-M, Park S “Black Hole Attack in Mobile Ad Hoc Network”s. Paper presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE’42), Huntsville, Alabama, 2-3 April 2004
[10] Tamilselvan L, Sankaranarayanan V “Prevention of Blackhole Attack in MANET”. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27-30 August 2007
[11] Djenouri D, Badache N “Struggling Against Selfishness and Black Hole Attacks in MANETs”. Wireless Communications & Mobile Computing 8(6):689–704. doi: 10.1002/wcm.v8:6, 2008.
[12] Oliveira R, Bhargava B, Azarmi M, Ferreira EWT, Wang W, Lindermann M “Developing Attack Defense Ideas for Ad Hoc Wireless Networks”. Paper presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009
[13] Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”. Paper presented at the International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003
[14] Weerasinghe H, Fu H “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”. Paper presented at the Future Generation Communication and Networking, Jeju-Island, Korea, 6-8 December 2007.
[15] Opnet Technologies, Inc. “Opnet Simulator,” Internet: www.opnet.com, date last viewed: 2010-05-05
[16] S. Kurosawa et al., “Detecting Blackhole Attack on AODV-Based Mobile Ad-Hoc Networks by Dynamic”
[17] M. Al-Shurman, S-M. Yoo, and S. Park, “Black Hole Attack in Mobile Ad-Hoc Networks,” ACM Southeast Regional Conf. 2004.
[18] H. Deng, W. Li, Agrawal, D.P., “Routing security in wireless Ad-Hoc networks,” Cincinnati Univ.,OH, USA; IEEE Communications Magazine, , Vol.40, pp.70- 75, ISSN: 0163-6804, Oct. 2002.
[19] Subrata Paul, Anirban Mitra, Ramanuja Nayak, "On some Security aspect of HPC Environment", International Journal Of Engineering And Computer Science, Vol 3 (1), January 2014, Pp .3758 - 3762.
[20] Anirban Mitra, BK Ray, "A GSM-Free Scheme for Location Management", Journal of the Institution of Engineers (IE - India), 88, 2008, pp.9-12.
[21] Anirban Mitra, R Nayak, "Location Management for Mobile Devices In Ad Hoc Network and Implementing its Security Aspect", Proceeding of National Conference in Computational Intelligence and Network Security, CINS, VEC - Chennai, India, March 2010.

Mobile Ad-Hoc networks, Black Hole Attack, AODV Protocol, Security.