Skip to main content

Analysis of Black Hole Attack in Ad Hoc Network Using AODV and AOMDV Protocols

  • Conference paper
  • First Online:
Emerging Research in Computing, Information, Communication and Applications

Abstract

Security is an essential factor in wireless ad hoc network to have safety in transmitting data packets between two wireless sensor nodes. The nodes posses a unique characteristics and it leads to consequential challenges to security design. Comparing to other wireless networks WSN has more security problem; this may be due to its nature of broadcasting messages, resources and their environment. One of the traditional and main attacks of WSNs is Black Hole Attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhosle, A.A., Thosar, T.P., Mehatre, S.: Black-hole and wormhole attack in routing protocol AODV in MANET. IJCSEA 2(1), (February 2012)

    Google Scholar 

  2. Khin, E.E., Phyu, T.: Impact of black hole attack on AODV routing protocol. IJITMC 2(2), (May 2014)

    Google Scholar 

  3. Virmani, D., Soni, A., Batra, N.: Reliability analysis to overcome black hole attack in wireless sensor network. In: ICCIN-2K14| January 03–04, 2014

    Google Scholar 

  4. Naseera, K.M., Chandrasekar, C.: Prevention of black hole attack using AOMDV. IJERA 3(6), (Nov–Dec 2013)

    Google Scholar 

  5. Bhardwaj, N., Singh, R.: Detection and avoidance of blackhole attack in AOMDV protocol in MANETs. IJAIEM 3(5), (May 2014)

    Google Scholar 

  6. Pooja, Jaglan, S., Gupta, R.: Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(8), (August 2014). ISSN:2277 128X

    Google Scholar 

  7. Manikandan, T., Shitharth, S., Senthilkumar, C., Sebastinalbina, C., Kamaraj, N.: Removal of selective black hole attack in MANET by AODV protocol. IJIRSET 3(3), (March 2014)

    Google Scholar 

  8. Vyas, T.G., Rana, D.J.: Survey on black hole detection and prevention in MANET. IJARCSSE 4(9), (September 2014)

    Google Scholar 

  9. Jain, A.: Trust based routing mechanism against black hole attack using AOMDV-IDS system in MANET format. IJETAE 2(4), (April 2013)

    Google Scholar 

  10. Mohebi, A., Kamal, E., Scott, S.: Simulation and analysis of AODV and DSR routing protocol under black hole attack. IJMECS (November 2013)

    Google Scholar 

  11. Verma, Monika, Barwar, N.C.: A comparative analysis of DSR and AODV protocols under black hole and gray hole attacks. IJCSIT 5(6), 7228–7231 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Jayachandra, S.H., Manjunatha, R., Hussain, N., Sujan, B.U., Gururaj, H.L., Ramesh, B. (2016). Analysis of Black Hole Attack in Ad Hoc Network Using AODV and AOMDV Protocols. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2553-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2553-9_10

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2552-2

  • Online ISBN: 978-81-322-2553-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics