Skip to main content

Abstract

Security is a primary goal in order to provide data transmission or communication among mobile hops in hostile wireless environment. MANET is self-configuration and decentralized-type network and it is different from wired one. Some unique characteristics of MANET are dynamic topology, self-configuration, and strict resources and shared medium; make it different from wired infrastructure. All nodes in mobile ad hoc network perform their task in associative way. These characteristics become also challenges for MANET to some extent and make a situation to build a solution that provides broad protection and efficient performance. Security is a very important characteristic during implementation of MANET or other network. MANET is widely used in our daily life like meeting, conference, medical field emergency situations like flood, earthquake, and military operation. In this chapter we discuss on the security services in MANET. We also discuss security attack at different layers and our major concern about network layer attack is especially on black hole attack and its existing solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D’Innocenzo, A., Di Benedetto, M.D., Smarra, F.: Fault detection and isolation of malicious nodes in MIMO multi-hop control networks. In: IEEE 52nd Annual Conference on Decision and Control (CDC). IEEE (2013)

    Google Scholar 

  2. Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc networks. IEEE Commun. Surv. 7(4), 2−28 (2005)

    Google Scholar 

  3. Lo, N.-W., Liu, F.-L.: A secure routing protocol to prevent cooperative black hole attack in MANET. In: Intelligent Technologies and Engineering Systems, pp. 59−65. Springer, New York (2013)

    Google Scholar 

  4. Mundinger, J., Le Boudec, J.-Y.: Analysis of a reputation system for mobile ad-hoc networks with liars. Perform. Eval. 65(3), 212–226 (2008)

    Article  Google Scholar 

  5. Sharma, K., Khandelwal, N., Prabhakar, M.: An overview of security problems in MANET. In: Proceedings of the International Conference on Network Protocols (ICNP) (2010)

    Google Scholar 

  6. Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: DoS attacks in mobile ad hoc networks: a survey. In: Second International Conference on Advanced Computing & Communication Technologies (ACCT). IEEE (2012)

    Google Scholar 

  7. Yang, H., et al.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun. 11(1) 38−47 (2004)

    Google Scholar 

  8. Rai, P., Singh, S.: A review of ‘MANET’s security aspects and challenges’. Int. J. Comput. Appl. IJCA 4, 162–166 (2010)

    Google Scholar 

  9. Qasim, N., Said, F., Aghvami, H.: Performance evaluation of mobile ad hoc networking protocols. In: Advances in Electrical Engineering and Computational Science, pp. 219−229. Springer, The Netherlands (2009)

    Google Scholar 

  10. Gupta, R.: Mobile adhoc network (MANETS): proposed solution to security related issues. Indian J. Comput. Sci. Eng. (IJCSE) 2(5), 748–46 (2011)

    Google Scholar 

  11. Sharma, N., Sharma, A.: The Black-hole node attack in MANET. In: Second International Conference on Advanced Computing and Communication Technologies (ACCT). IEEE (2012)

    Google Scholar 

  12. Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA’99. IEEE (1999)

    Google Scholar 

  13. Jhaveri, R. H., et al.: MANET routing protocols and wormhole attack against AODV. Int. J. Comput. Sci. Netw. Secur. 10(4), 12−18 (2010)

    Google Scholar 

  14. Nadeem, A., Howarth, M.P.: A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tut. 15(4), 2027–2045 (2013)

    Article  Google Scholar 

  15. Darji, D., Thakkar, N.B.: Challenges in mobile ad hoc networks: security threats and its solutions. Indian J. Appl. Res. (2013)

    Google Scholar 

  16. http://www.webopedia.com/TERM/D/DoS_attack.html. Accessed Nov 2014

  17. http://www.springerreference.com/docs/html/chapterdbid/317115.html. Accessed Nov 2014

  18. http://searchfinancialsecurity.techtarget.com/definition/eavesdropping. Accessed Nov 2014

  19. https://www.owasp.org/index.php/Network_Eavesdropping. Accessed Nov 2014

  20. https://sites.google.com/site/securezrp/routingattacks. Accessed Nov 2014

  21. www.wikipedia.com. Accessed Nov 2014

  22. http://www.informit.com/articles/article.aspx?p=361984&seqNum=10 (2014)

  23. http://www.answers.com/Q/What_is_Packet_Replication_Attack. Accessed Nov 2014

  24. Tamilselvan, L., Sankaranarayanan, V.: Prevention of blackhole attack in MANET. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007. IEEE (2007)

    Google Scholar 

  25. Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference. ACM (2004)

    Google Scholar 

  26. Mistry, N., Jinwala, D.C., Zaveri, M.: Improving AODV protocol against blackhole attacks. In: Proceedings of the International Multi Conference of Engineers and Computer Scientists, vol. 2 (2010)

    Google Scholar 

  27. Raj, P.N., Swadas, P.B.: Dpraodv: a dyanamic learning system against blackhole attack in aodv based manet (2009). arXiv preprint arXiv:0909.2371

  28. Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. In: Future generation communication and networking (fgcn 2007), vol. 2. IEEE (2007)

    Google Scholar 

  29. Chaudhary, A., Kumar, A., Tiwar, V.N.: A reliable solution against packet dropping attack due to malicious nodes using fuzzy logic in MANETs. In: International Conference on Optimization, Reliabilty, and Information Technology (ICROIT). IEEE (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shruti Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Shruti Singh, Abhishek Bajpai, Suryambika (2016). A Survey on Black Hole Attack in MANET. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_105

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2638-3_105

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2636-9

  • Online ISBN: 978-81-322-2638-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics