International Journal of Information Technology

, Volume 11, Issue 4, pp 859–867 | Cite as

Malicious node analysis in MANETS

  • Tauseef Jamal
  • Shariq Aziz ButtEmail author
Original Research


The mobile ad hoc networks (MANETS) are decentralized, multi-hop networks in which the intermediate nodes play an role of routers to pass data packets to destination. The Routing protocols are playing very vital role in effectiveness of MANETS due to mobility and dynamically changing of topology. Due to the nature of broadcast wireless medium and not have central control now many routing protocols are vulnerable to attacks. These attacks are black hole attack, greyhole attack, sinkhole attack, byzantine attack, sleep deprivation attack and wormhole attack. The paper is discussing all these attacks. From these routing protocols, one of protocol is ad hoc on-demand distance vector routing (AODV). It is a very trendy routing protocol and it is very susceptible to black hole attacks. In black hole attack a mobile node mistakenly publicize the route and sinks data packets to incorrect destination instead of sending to accurate destination. It analyzes the related work and position a solution based on analysis.


Ad hoc networks Routing Black -hole attack Malicious node Packet dropping 


  1. 1.
    Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K (2003) Prevention of cooperative black hole attack in wireless ad hoc networks. In: 2003 International conference on wireless networks (ICWN 03), Las Vegas, Nevada, USAGoogle Scholar
  2. 2.
    Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int J Netw Secur 5(3):338–346Google Scholar
  3. 3.
    Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in MANET. J Netw 3(5):13–20Google Scholar
  4. 4.
    Weerasinghe H, Fu H (2008) Prevention of co-operative black hole attack in MANET: simulation implementation and evaluation. Int J Softw Eng Appl 2(3)Google Scholar
  5. 5.
    Su MY, Chiang K-L, Liao W-C (2010) Mitigation of black hole attack nodes in mobile ad hoc network. In: International symposium on parallel and distributed processing with application. IEEE Conference, Taipei, TaiwanGoogle Scholar
  6. 6.
    Gupta S, Kar S, Daramraja S (2011) BAAP: black hole attack avoidance protocol for wireless sensor network. In: 2nd International conference on computer and communication technology (ICCCT), IEEE,  Allahabad, IndiaGoogle Scholar
  7. 7.
    Jhaveri RH, Patel SJ, Jinwala DC (2012) A novel approach for gray hole attack and black hole attacks in mobile Ad hoc networks. In: 2nd international on advanced computer and communication technologies (ACCT), IEEE, Rohtak, Haryana, IndiaGoogle Scholar
  8. 8.
    Chatterje N, Mandal JK (2013) Detection of black hole behavior using triangular encryption in NS2. In: 1st international conference on computational intelligence: modeling techniques and applications (CIMTA), Procedia Technology Elsevier, pp 524–529Google Scholar
  9. 9.
    Tan S, Kim K (2013) Secure route discovery for preventing black hole attacks on AODV based MANETS. ICT Convergence (ICTC). In: 2013 International conference, JejuGoogle Scholar
  10. 10.
    Perkins CE, Royer EM (1999) Ad hoc on demand distance vector routing, mobile computing system and applications. In: Second IEEE workshop on mobile computing systems and applications, WMCSA IEEE, New Orleans, USAGoogle Scholar
  11. 11.
    Jamal T, Butt SA (2017) Low-energy adaptive clustering hierarchy (LEACH) enhancement for military security operations. J Basic Appl Sci Res 7(5):12–17 (ISSN 2090-4304) Google Scholar
  12. 12.
    Jamal T, Alam M, Umair MM (2017) Detection and prevention against RTS attacks in wireless LANs. In: International conference on communication, computing and digital systems (C-CODE), IEEE, Islamabad, PakistanGoogle Scholar
  13. 13.
    Jamal T, Mendes P (2014) Cooperative relaying in user-centric networking under interference conditions. In: IEEE communications magazine, vol. 52, no. 12, pp. 18–24. CrossRefGoogle Scholar
  14. 14.
    Makwana S, Vaghela K (2015) Detection and elimination of gray hole attack using dynamic credit based technique in MANET. Int J Comput Appl 125(4):975–8887Google Scholar
  15. 15.
    Sharma R (2016) Gray-hole attack in mobile ad hoc networks: a survey. IJCSIT 7Google Scholar
  16. 16.
    Gandhewar N, Patel R (2012) Detection & prevention of sinkhole attack on AODV protocol in mobile adhoc network. In: Fourth international conference on computational intelligence and communication networks, IEEE, Mathura, IndiaGoogle Scholar
  17. 17.
    Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1:293–315CrossRefGoogle Scholar
  18. 18.
    Jhaveriand RH, Patel AD (2010) MANET routing protocols and wormhole attack against AODV. IJCSNS Int J Comput Sci Netw Secur 10(4):12–18Google Scholar
  19. 19.
    Geetha A, Sreenath N (2016) Byzantine attacks and its security measures in mobile adhoc networks. Int J Comput Commun Instrum Engg (IJCCIE) 3(1)Google Scholar
  20. 20.
    Sarkar M, Roy DB (2011) Prevention of sleep deprivation attacks using clustering. In: 3rd international conference on  electronics computer technology (ICECT), IEEE, Kanyakumari, IndiaGoogle Scholar
  21. 21.
    Pirretti M, Zhu S (2006) The sleep deprivation attack in sensor networks: analysis and methods of defense. Int J Distrib Sens Netw SAGE 2:267–287CrossRefGoogle Scholar

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2018

Authors and Affiliations

  1. 1.Computer Science DepartmentPIEAS University PakistanIslamabadPakistan

Personalised recommendations