A survey of Black hole attack detection in Manet
Title | A survey of Black hole attack detection in Manet |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Sarma, K.J., Sharma, R., Das, R. |
Conference Name | Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on |
Date Published | Feb |
Keywords | academic purpose, Ad-HOC, AODV protocol, Black hole attack, black hole attack detection, client, client-server systems, decentralised network, emergency communication, Europe, MANET, military communication, mobile ad hoc networks, mobile ad-hoc network, Mobile communication, mobile conferencing, network servers, Peer-to-peer computing, peer-to-peer network, radiowave propagation, received RREQ, route discovery, Routing protocols, RREP, RREQ, security, server, telecommunication security |
Abstract | MANET is an infrastructure less, dynamic, decentralised network. Any node can join the network and leave the network at any point of time. Due to its simplicity and flexibility, it is widely used in military communication, emergency communication, academic purpose and mobile conferencing. In MANET there no infrastructure hence each node acts as a host and router. They are connected to each other by Peer-to-peer network. Decentralised means there is nothing like client and server. Each and every node is acted like a client and a server. Due to the dynamic nature of mobile Ad-HOC network it is more vulnerable to attack. Since any node can join or leave the network without any permission the security issues are more challenging than other type of network. One of the major security problems in ad hoc networks called the black hole problem. It occurs when a malicious node referred as black hole joins the network. The black hole conducts its malicious behavior during the process of route discovery. For any received RREQ, the black hole claims having route and propagates a faked RREP. The source node responds to these faked RREPs and sends its data through the received routes once the data is received by the black hole; it is dropped instead of being sent to the desired destination. This paper discusses some of the techniques put forwarded by researchers to detect and prevent Black hole attack in MANET using AODV protocol and based on their flaws a new methodology also have been proposed. |
URL | https://ieeexplore.ieee.org/document/6781279/ |
DOI | 10.1109/ICICICT.2014.6781279 |
Citation Key | 6781279 |
- Mobile communication
- telecommunication security
- server
- security
- RREQ
- RREP
- Routing protocols
- route discovery
- received RREQ
- radiowave propagation
- peer-to-peer network
- Peer-to-peer computing
- network servers
- mobile conferencing
- academic purpose
- mobile ad-hoc network
- mobile ad hoc networks
- military communication
- MANET
- Europe
- emergency communication
- decentralised network
- client-server systems
- client
- black hole attack detection
- Black hole attack
- AODV protocol
- Ad-HOC