Abstract
Security is a primary goal in order to provide data transmission or communication among mobile hops in hostile wireless environment. MANET is self-configuration and decentralized-type network and it is different from wired one. Some unique characteristics of MANET are dynamic topology, self-configuration, and strict resources and shared medium; make it different from wired infrastructure. All nodes in mobile ad hoc network perform their task in associative way. These characteristics become also challenges for MANET to some extent and make a situation to build a solution that provides broad protection and efficient performance. Security is a very important characteristic during implementation of MANET or other network. MANET is widely used in our daily life like meeting, conference, medical field emergency situations like flood, earthquake, and military operation. In this chapter we discuss on the security services in MANET. We also discuss security attack at different layers and our major concern about network layer attack is especially on black hole attack and its existing solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D’Innocenzo, A., Di Benedetto, M.D., Smarra, F.: Fault detection and isolation of malicious nodes in MIMO multi-hop control networks. In: IEEE 52nd Annual Conference on Decision and Control (CDC). IEEE (2013)
Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc networks. IEEE Commun. Surv. 7(4), 2−28 (2005)
Lo, N.-W., Liu, F.-L.: A secure routing protocol to prevent cooperative black hole attack in MANET. In: Intelligent Technologies and Engineering Systems, pp. 59−65. Springer, New York (2013)
Mundinger, J., Le Boudec, J.-Y.: Analysis of a reputation system for mobile ad-hoc networks with liars. Perform. Eval. 65(3), 212–226 (2008)
Sharma, K., Khandelwal, N., Prabhakar, M.: An overview of security problems in MANET. In: Proceedings of the International Conference on Network Protocols (ICNP) (2010)
Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: DoS attacks in mobile ad hoc networks: a survey. In: Second International Conference on Advanced Computing & Communication Technologies (ACCT). IEEE (2012)
Yang, H., et al.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun. 11(1) 38−47 (2004)
Rai, P., Singh, S.: A review of ‘MANET’s security aspects and challenges’. Int. J. Comput. Appl. IJCA 4, 162–166 (2010)
Qasim, N., Said, F., Aghvami, H.: Performance evaluation of mobile ad hoc networking protocols. In: Advances in Electrical Engineering and Computational Science, pp. 219−229. Springer, The Netherlands (2009)
Gupta, R.: Mobile adhoc network (MANETS): proposed solution to security related issues. Indian J. Comput. Sci. Eng. (IJCSE) 2(5), 748–46 (2011)
Sharma, N., Sharma, A.: The Black-hole node attack in MANET. In: Second International Conference on Advanced Computing and Communication Technologies (ACCT). IEEE (2012)
Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA’99. IEEE (1999)
Jhaveri, R. H., et al.: MANET routing protocols and wormhole attack against AODV. Int. J. Comput. Sci. Netw. Secur. 10(4), 12−18 (2010)
Nadeem, A., Howarth, M.P.: A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tut. 15(4), 2027–2045 (2013)
Darji, D., Thakkar, N.B.: Challenges in mobile ad hoc networks: security threats and its solutions. Indian J. Appl. Res. (2013)
http://www.webopedia.com/TERM/D/DoS_attack.html. Accessed Nov 2014
http://www.springerreference.com/docs/html/chapterdbid/317115.html. Accessed Nov 2014
http://searchfinancialsecurity.techtarget.com/definition/eavesdropping. Accessed Nov 2014
https://www.owasp.org/index.php/Network_Eavesdropping. Accessed Nov 2014
https://sites.google.com/site/securezrp/routingattacks. Accessed Nov 2014
www.wikipedia.com. Accessed Nov 2014
http://www.informit.com/articles/article.aspx?p=361984&seqNum=10 (2014)
http://www.answers.com/Q/What_is_Packet_Replication_Attack. Accessed Nov 2014
Tamilselvan, L., Sankaranarayanan, V.: Prevention of blackhole attack in MANET. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007. IEEE (2007)
Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference. ACM (2004)
Mistry, N., Jinwala, D.C., Zaveri, M.: Improving AODV protocol against blackhole attacks. In: Proceedings of the International Multi Conference of Engineers and Computer Scientists, vol. 2 (2010)
Raj, P.N., Swadas, P.B.: Dpraodv: a dyanamic learning system against blackhole attack in aodv based manet (2009). arXiv preprint arXiv:0909.2371
Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. In: Future generation communication and networking (fgcn 2007), vol. 2. IEEE (2007)
Chaudhary, A., Kumar, A., Tiwar, V.N.: A reliable solution against packet dropping attack due to malicious nodes using fuzzy logic in MANETs. In: International Conference on Optimization, Reliabilty, and Information Technology (ICROIT). IEEE (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Shruti Singh, Abhishek Bajpai, Suryambika (2016). A Survey on Black Hole Attack in MANET. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_105
Download citation
DOI: https://doi.org/10.1007/978-81-322-2638-3_105
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2636-9
Online ISBN: 978-81-322-2638-3
eBook Packages: EngineeringEngineering (R0)