Skip to main content

A Performance Analysis of Black Hole Detection Mechanisms in Ad Hoc Networks

  • Conference paper
  • First Online:
Proceedings of the International Conference on Soft Computing Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 398))

  • 1222 Accesses

Abstract

A continuous infrastructure-less, self-configured collection of mobile devices connected as a network without wires is termed as mobile ad hoc network (MANET). Dynamic topology, shared physical medium, and distributed operations are some of the characteristics of MANETs due to which they are highly vulnerable to security threats. Black hole attack is a kind of attack that compromises security by redirecting the entire traffic to a node that is not actually present in the network. This paper aims to detect black hole using three detection schemes, i.e., Time-based threshold detection schemes, DRI table with cross checking scheme, and distributed cooperative mechanism. Comparative analyses on all three schemes are done to find out which one detects black hole more accurately. The measurements are taken on the light of packet delivery ratio, throughput, energy consumption and end-to-end delay. Simulation is performed using Network Simulator-2 (NS2).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yadav H, Kumar R (2011) A review on black hole attack in MANETs. In: 13th international conference on advanced communication technology (ICACT)

    Google Scholar 

  2. Chanchal A, Chander D (2013) Black hole attack in AODV routing protocol: a review. Int J Adv Res Comput Sci Softw Eng

    Google Scholar 

  3. Bhat MS, Shwetha D, Devaraju JT (2011) A performance study of proactive, reactive and hybrid routing protocols using qualnet simulator. Int J Comput Appl 28

    Google Scholar 

  4. Perkins CE (2008) Ad hoc networking. Addison-Wesley Professional

    Google Scholar 

  5. Sharma S, Gupta R (2009) Simulation study of blackhole attack in the mobile ad hoc networks. J Eng Sci Technol 4(2):243–250

    Google Scholar 

  6. Vasanthavalli S, Bhargava RG, Thenappan S Dr (2014) Peruse of black hole attack and prevention using AODV on MANET. Int J Innov Res Sci Eng Technol

    Google Scholar 

  7. Tsou P-C, Chang J-M (2011) Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. ICACT

    Google Scholar 

  8. Agarwal R, Arora K, Singh RR (2014) Comparing various black hole attack prevention mechanisms in MANETs

    Google Scholar 

  9. Kaur G, Singh M (2013) Packet monitor scheme for prevention of black-hole attack in mobile Ad-hoc network. Int J Comput Sci Commun Eng

    Google Scholar 

  10. Anita EM, Vasudevan V (2010) Black hole attack prevention in multicast routing protocols for mobile ad hoc networks using certificate chaining. Int J Comput Appl 1(12):21–22

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Manjusha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Manjusha, V., Radhika, N. (2016). A Performance Analysis of Black Hole Detection Mechanisms in Ad Hoc Networks. In: Suresh, L., Panigrahi, B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, vol 398. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2674-1_40

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2674-1_40

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2672-7

  • Online ISBN: 978-81-322-2674-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics