Visible to the public A survey of Black hole attack detection in Manet

TitleA survey of Black hole attack detection in Manet
Publication TypeConference Paper
Year of Publication2014
AuthorsSarma, K.J., Sharma, R., Das, R.
Conference NameIssues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on
Date PublishedFeb
Keywordsacademic purpose, Ad-HOC, AODV protocol, Black hole attack, black hole attack detection, client, client-server systems, decentralised network, emergency communication, Europe, MANET, military communication, mobile ad hoc networks, mobile ad-hoc network, Mobile communication, mobile conferencing, network servers, Peer-to-peer computing, peer-to-peer network, radiowave propagation, received RREQ, route discovery, Routing protocols, RREP, RREQ, security, server, telecommunication security
Abstract

MANET is an infrastructure less, dynamic, decentralised network. Any node can join the network and leave the network at any point of time. Due to its simplicity and flexibility, it is widely used in military communication, emergency communication, academic purpose and mobile conferencing. In MANET there no infrastructure hence each node acts as a host and router. They are connected to each other by Peer-to-peer network. Decentralised means there is nothing like client and server. Each and every node is acted like a client and a server. Due to the dynamic nature of mobile Ad-HOC network it is more vulnerable to attack. Since any node can join or leave the network without any permission the security issues are more challenging than other type of network. One of the major security problems in ad hoc networks called the black hole problem. It occurs when a malicious node referred as black hole joins the network. The black hole conducts its malicious behavior during the process of route discovery. For any received RREQ, the black hole claims having route and propagates a faked RREP. The source node responds to these faked RREPs and sends its data through the received routes once the data is received by the black hole; it is dropped instead of being sent to the desired destination. This paper discusses some of the techniques put forwarded by researchers to detect and prevent Black hole attack in MANET using AODV protocol and based on their flaws a new methodology also have been proposed.

URLhttps://ieeexplore.ieee.org/document/6781279/
DOI10.1109/ICICICT.2014.6781279
Citation Key6781279