Abstract
A continuous infrastructure-less, self-configured collection of mobile devices connected as a network without wires is termed as mobile ad hoc network (MANET). Dynamic topology, shared physical medium, and distributed operations are some of the characteristics of MANETs due to which they are highly vulnerable to security threats. Black hole attack is a kind of attack that compromises security by redirecting the entire traffic to a node that is not actually present in the network. This paper aims to detect black hole using three detection schemes, i.e., Time-based threshold detection schemes, DRI table with cross checking scheme, and distributed cooperative mechanism. Comparative analyses on all three schemes are done to find out which one detects black hole more accurately. The measurements are taken on the light of packet delivery ratio, throughput, energy consumption and end-to-end delay. Simulation is performed using Network Simulator-2 (NS2).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yadav H, Kumar R (2011) A review on black hole attack in MANETs. In: 13th international conference on advanced communication technology (ICACT)
Chanchal A, Chander D (2013) Black hole attack in AODV routing protocol: a review. Int J Adv Res Comput Sci Softw Eng
Bhat MS, Shwetha D, Devaraju JT (2011) A performance study of proactive, reactive and hybrid routing protocols using qualnet simulator. Int J Comput Appl 28
Perkins CE (2008) Ad hoc networking. Addison-Wesley Professional
Sharma S, Gupta R (2009) Simulation study of blackhole attack in the mobile ad hoc networks. J Eng Sci Technol 4(2):243–250
Vasanthavalli S, Bhargava RG, Thenappan S Dr (2014) Peruse of black hole attack and prevention using AODV on MANET. Int J Innov Res Sci Eng Technol
Tsou P-C, Chang J-M (2011) Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. ICACT
Agarwal R, Arora K, Singh RR (2014) Comparing various black hole attack prevention mechanisms in MANETs
Kaur G, Singh M (2013) Packet monitor scheme for prevention of black-hole attack in mobile Ad-hoc network. Int J Comput Sci Commun Eng
Anita EM, Vasudevan V (2010) Black hole attack prevention in multicast routing protocols for mobile ad hoc networks using certificate chaining. Int J Comput Appl 1(12):21–22
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Manjusha, V., Radhika, N. (2016). A Performance Analysis of Black Hole Detection Mechanisms in Ad Hoc Networks. In: Suresh, L., Panigrahi, B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, vol 398. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2674-1_40
Download citation
DOI: https://doi.org/10.1007/978-81-322-2674-1_40
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2672-7
Online ISBN: 978-81-322-2674-1
eBook Packages: EngineeringEngineering (R0)