BibTex RIS Cite

Black Hole Attacks in Mobile Ad Hoc Networks

Year 2015, Volume: 4 Issue: 9, 46 - 57, 01.09.2015

Abstract

Mobile ad hoc networks are used on different occasions, especially during crises. In risk and crisis management, communications is considered vital. With regard to their features, mobile ad hoc networks can be very helpful when dealing with a crisis such as flood, earthquake, war, etc. Security is nowadays considered as one of the main concerns in mobile ad hoc networks. And blac khole attack is among the most important threats of mobile ad hoc networks, where the malicious node places itself along the route by deceiving other nodes and then drops data packets. This paper attempted to investigate a number of proposed solutions against blac khole attacks.

References

  • Y.F. Alem and Z.C. Xuan, Preventing Black Hole Attack in Mobile Ad-Hoc Networks Using Anomaly Detection, Proceedings of the International Conference on Future Computer and Communication (ICFCC), 2010, Volume: 3, pp: 672-676.
  • S. Banerjee and K. Majumder, A Survey of Black Hole Attacks and Countermeasures in Wireless Mobile Ad-Hoc Networks, Proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science, 2012, Volume: 335, pp: 396-407.
  • J. Ben Othman and L. Mokdad, Enhancing Data Security in Ad Hoc Networks based on Multipath Routing, Journal of Parallel and Distributed Computing 70 (2010) 309-316.
  • K. Chang and K.G. Shin, Application-Layer Intrusion Detection in MANETs, Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS), 2010, pp:1-10.
  • R. Chatterjee and M. Routray, Black Hole Combat Using Node Stability System in MANET, Signal Processing and Information Technology (2012) 249-254.
  • A. Esfandi, Efficient Anomaly Intrusion Detection System in Adhoc Networks by Mobile Agents, Proceedings of the 3rd International Conference on Computer Science and Information Technology (ICCSIT), IEEE 2010, Volume: 7, PP: 73-77.
  • N. Jaisankar, R. Saravanan and K.D. Swamy, A Novel Security Approach for Detecting Black Hole Attack in MANET, Information Processing and Management, (2010) 217-223.
  • R. Mahapatra, N. Garg, R. Sharma and P. Pal, Interaction Between Nodes in MANET, Proceedings of the International Conference on Computational Intelligence and Computing Research (ICCIC), IEEE 2010, pp: 1-5.
  • N. Mistry, D.C. Jinwala and M. Zaveri, Improving AODV Protocol Against Blackhole Attacks, Proceedings of the International Multi Conference of Engineers and Computer Scientists, 2010 Volume 2.
  • P. Moradiya and S. Sampalli, Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks, Proceedings of the International Conference on Embedded and Ubiquitous Computing, IEEE/IFIP 2010, pp: 542-547.
  • M. Kuchaki Rafsanjani, A.A. Khavasi and A. Movaghar, An efficient method for identifying IDS agent nodes by discovering compromised nodes in MANET, Proceedings of the Second International Conference on Computer and Electrical Engineering ICCEE'09, 2009, Volume:1, pp: 625-629.
  • R. Raja Mahmood and A. Khan, A Survey on Detecting Black Hole Attack in AODVBased Mobile Ad Hoc Networks, Proceedings of the International Symposium on High Capacity Optical Networks and Enabling Technologies, 2007, pp: 1-6.
  • S.A. Razak, S. Furnell, N.L. Clarke and P.J. Brooke, Friend-assisted Intrusion Detection and Response Mechanisms for Mobile Ad Hoc Networks, Ad Hoc Networks 6 (2008) 1151-1167.
  • M.A. Ritonga and M. Nakayama, Manager-Based Architecture in Ad Hoc Network Intrusion Detection System for Fast Detection Time, Proceedings of the International Symposium on Applications and the Internet SAINT, 2008, pp: 76-82.
  • M. Sayee Kumar, S. Selvarajan and S. Balu, ANODR Based Anomaly Detection for Black Hole and Route Disrupt Attacks, Proceedings of the International Conference on Computing, Communication and Networking, IEEE 2008, pp: 1-5.
  • S. Schuhmann and L. Volker, Combining Passive Autoconfiguration and AnomalyBased Intrusion Detection in Ad Hoc Networks, Proceedings of the Eighth International Workshop on Applications and Services in Wireless Networks, IEEE 2008, pp: 87-95.
  • F. Shi, W. Liu and D. Jin, Preventing Black hole Attack in DSR-Based Wireless Ad Hoc Networks, Computer Science and its Applications (2012) 953-969.
  • M. Shobana, R. Saranyadevi and S. Karthik, Geographic Routing Used in MANET for Black Hole Detection, Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, 2012, pp: 201-204.
  • M.Y. Su, Prevention of Selective Black Hole Attacks on Mobile Ad Hoc NetworksThrough Intrusion Detection Systems, Computer Communications 34 (2011) 107-117.
  • A. Taggu, TraceGray: An Application-layer Scheme for Intrusion Detection in MANET Using Mobile Agents, Proceedings of the Third International Conference on Communication Systems and Networks (COMSNETS), 2011, pp: 1-4.
  • K. Vishnu and A.J. Paul, Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile AdHoc Networks, International Journal of Computer Applications 1(2010) 40-44.
  • I. Woungang, S. Dhurandher, R. Peddi and M. Obaidat, Detecting Black Hole Attacks on DSR-based Mobile Ad Hoc Networks, Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS), 2012, pp: 1-5.
  • P. Yi, T. Zhu, N. Liu, Y. Wu and J. Li, Cross-layer Detection for Black Hole Attack in Wireless Network, Journal of Computational Information Systems 8 (2012) 4101-4109.
Year 2015, Volume: 4 Issue: 9, 46 - 57, 01.09.2015

Abstract

References

  • Y.F. Alem and Z.C. Xuan, Preventing Black Hole Attack in Mobile Ad-Hoc Networks Using Anomaly Detection, Proceedings of the International Conference on Future Computer and Communication (ICFCC), 2010, Volume: 3, pp: 672-676.
  • S. Banerjee and K. Majumder, A Survey of Black Hole Attacks and Countermeasures in Wireless Mobile Ad-Hoc Networks, Proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science, 2012, Volume: 335, pp: 396-407.
  • J. Ben Othman and L. Mokdad, Enhancing Data Security in Ad Hoc Networks based on Multipath Routing, Journal of Parallel and Distributed Computing 70 (2010) 309-316.
  • K. Chang and K.G. Shin, Application-Layer Intrusion Detection in MANETs, Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS), 2010, pp:1-10.
  • R. Chatterjee and M. Routray, Black Hole Combat Using Node Stability System in MANET, Signal Processing and Information Technology (2012) 249-254.
  • A. Esfandi, Efficient Anomaly Intrusion Detection System in Adhoc Networks by Mobile Agents, Proceedings of the 3rd International Conference on Computer Science and Information Technology (ICCSIT), IEEE 2010, Volume: 7, PP: 73-77.
  • N. Jaisankar, R. Saravanan and K.D. Swamy, A Novel Security Approach for Detecting Black Hole Attack in MANET, Information Processing and Management, (2010) 217-223.
  • R. Mahapatra, N. Garg, R. Sharma and P. Pal, Interaction Between Nodes in MANET, Proceedings of the International Conference on Computational Intelligence and Computing Research (ICCIC), IEEE 2010, pp: 1-5.
  • N. Mistry, D.C. Jinwala and M. Zaveri, Improving AODV Protocol Against Blackhole Attacks, Proceedings of the International Multi Conference of Engineers and Computer Scientists, 2010 Volume 2.
  • P. Moradiya and S. Sampalli, Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks, Proceedings of the International Conference on Embedded and Ubiquitous Computing, IEEE/IFIP 2010, pp: 542-547.
  • M. Kuchaki Rafsanjani, A.A. Khavasi and A. Movaghar, An efficient method for identifying IDS agent nodes by discovering compromised nodes in MANET, Proceedings of the Second International Conference on Computer and Electrical Engineering ICCEE'09, 2009, Volume:1, pp: 625-629.
  • R. Raja Mahmood and A. Khan, A Survey on Detecting Black Hole Attack in AODVBased Mobile Ad Hoc Networks, Proceedings of the International Symposium on High Capacity Optical Networks and Enabling Technologies, 2007, pp: 1-6.
  • S.A. Razak, S. Furnell, N.L. Clarke and P.J. Brooke, Friend-assisted Intrusion Detection and Response Mechanisms for Mobile Ad Hoc Networks, Ad Hoc Networks 6 (2008) 1151-1167.
  • M.A. Ritonga and M. Nakayama, Manager-Based Architecture in Ad Hoc Network Intrusion Detection System for Fast Detection Time, Proceedings of the International Symposium on Applications and the Internet SAINT, 2008, pp: 76-82.
  • M. Sayee Kumar, S. Selvarajan and S. Balu, ANODR Based Anomaly Detection for Black Hole and Route Disrupt Attacks, Proceedings of the International Conference on Computing, Communication and Networking, IEEE 2008, pp: 1-5.
  • S. Schuhmann and L. Volker, Combining Passive Autoconfiguration and AnomalyBased Intrusion Detection in Ad Hoc Networks, Proceedings of the Eighth International Workshop on Applications and Services in Wireless Networks, IEEE 2008, pp: 87-95.
  • F. Shi, W. Liu and D. Jin, Preventing Black hole Attack in DSR-Based Wireless Ad Hoc Networks, Computer Science and its Applications (2012) 953-969.
  • M. Shobana, R. Saranyadevi and S. Karthik, Geographic Routing Used in MANET for Black Hole Detection, Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, 2012, pp: 201-204.
  • M.Y. Su, Prevention of Selective Black Hole Attacks on Mobile Ad Hoc NetworksThrough Intrusion Detection Systems, Computer Communications 34 (2011) 107-117.
  • A. Taggu, TraceGray: An Application-layer Scheme for Intrusion Detection in MANET Using Mobile Agents, Proceedings of the Third International Conference on Communication Systems and Networks (COMSNETS), 2011, pp: 1-4.
  • K. Vishnu and A.J. Paul, Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile AdHoc Networks, International Journal of Computer Applications 1(2010) 40-44.
  • I. Woungang, S. Dhurandher, R. Peddi and M. Obaidat, Detecting Black Hole Attacks on DSR-based Mobile Ad Hoc Networks, Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS), 2012, pp: 1-5.
  • P. Yi, T. Zhu, N. Liu, Y. Wu and J. Li, Cross-layer Detection for Black Hole Attack in Wireless Network, Journal of Computational Information Systems 8 (2012) 4101-4109.
There are 23 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Reza Amiri This is me

Marjan Rafsanjani This is me

Ehsan Khosravi This is me

Hadis Amiri This is me

Publication Date September 1, 2015
Published in Issue Year 2015 Volume: 4 Issue: 9

Cite

APA Amiri, R., Rafsanjani, M., Khosravi, E., Amiri, H. (2015). Black Hole Attacks in Mobile Ad Hoc Networks. Journal of New Results in Science, 4(9), 46-57.
AMA Amiri R, Rafsanjani M, Khosravi E, Amiri H. Black Hole Attacks in Mobile Ad Hoc Networks. JNRS. September 2015;4(9):46-57.
Chicago Amiri, Reza, Marjan Rafsanjani, Ehsan Khosravi, and Hadis Amiri. “Black Hole Attacks in Mobile Ad Hoc Networks”. Journal of New Results in Science 4, no. 9 (September 2015): 46-57.
EndNote Amiri R, Rafsanjani M, Khosravi E, Amiri H (September 1, 2015) Black Hole Attacks in Mobile Ad Hoc Networks. Journal of New Results in Science 4 9 46–57.
IEEE R. Amiri, M. Rafsanjani, E. Khosravi, and H. Amiri, “Black Hole Attacks in Mobile Ad Hoc Networks”, JNRS, vol. 4, no. 9, pp. 46–57, 2015.
ISNAD Amiri, Reza et al. “Black Hole Attacks in Mobile Ad Hoc Networks”. Journal of New Results in Science 4/9 (September 2015), 46-57.
JAMA Amiri R, Rafsanjani M, Khosravi E, Amiri H. Black Hole Attacks in Mobile Ad Hoc Networks. JNRS. 2015;4:46–57.
MLA Amiri, Reza et al. “Black Hole Attacks in Mobile Ad Hoc Networks”. Journal of New Results in Science, vol. 4, no. 9, 2015, pp. 46-57.
Vancouver Amiri R, Rafsanjani M, Khosravi E, Amiri H. Black Hole Attacks in Mobile Ad Hoc Networks. JNRS. 2015;4(9):46-57.


TR Dizin 31688

EBSCO30456


Electronic Journals Library EZB   30356

 DOAJ   30355                                             

WorldCat  30357                                             303573035530355

Academindex   30358

SOBİAD   30359

Scilit   30360


29388 As of 2021, JNRS is licensed under a Creative Commons Attribution-NonCommercial 4.0 International Licence (CC BY-NC).