Securing Data from Black Hole Attack Using AODV Routing for Mobile Ad Hoc Networks

  • V. Kamatchi
  • Rajeswari Mukesh
  • Rajakumar
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 177)


Mobile Adhoc Networks has become an important and exciting technology in recent years in which security has become an important issue. Black hole Attack is one of the possible and severe security attacks in mobile ad hoc networks which block the communication of secret data. Black hole attack directly attacks the node’s data traffic on the path and intentionally drops, alters or delays the data traffic passing through that node. In another type of black hole attack which falsely replies for the route request which comes from the source that it has enough routes to the destination even it does not have path to the destination. This paper deals with prevention of both types of black hole attacks and secure data communication using secret sharing and Random Multipath Routing Techniques.


Mobile Adhoc Networks AODV Blackhole attack Destination Sequence Number Random Routing 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Himral, L., Vig, V.: Preventing AODV Routing Protocol from Black Hole Attack. International Journal of Engineering Science and Technology 3(5), 3927–3932 (2011)Google Scholar
  2. 2.
    Claveirole, T., de Amorim, M.D., Abdalla, M., Viniotis, Y.: Securing wireless sensor networks against aggregator compromises. IEEE Communications Magazine, 134–141 (April 2008)Google Scholar
  3. 3.
    Raj, P.N., Swadas, P.B.: DPRAODV: A dynamic learning system against black hole attack in AODV based MANET. International Journal of Computer Science Issues (IJCSI) 2(3), 54–59 (2009)Google Scholar
  4. 4.
    Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: International Conference, ICWN 2003, Las Vegas, Nevada, USA, pp. 570–575 (2003)Google Scholar
  5. 5.
    Yoon, S.-M., Park, S., Al-Shurman, M.: Black Hole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, ACM South East Regional Conference, pp. 96–97 (2004)Google Scholar
  6. 6.
    Yu, C.W., Wu, T.-K., Cheng, R.-H., Chang, S.C.: A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 538–549. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringMeenakshi College of EngineeringChennaiIndia

Personalised recommendations