Prevention of Black Hole Attack in MANET
Main Article Content
Abstract
The reliability in the transmission of data among the nodes will always degrade with the dynamic nature of Manet. Due to lack of security the manet is not protected against the attacks. Black Hole attack is the most common attack experienced by the Manet. To prevent the black hole attack, this paper addresses the security oriented solution to authenticate the routes selected during the route discovery process using the digital certificates. During the route discovery itself the digital certificate authentication avoids the black hole node. This methodology is implemented on AOMDV protocol.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
K.Selvavinayaki, K.K.Shyam Shankar And Dr.E.Karthikeyan, “Security Enhanced Dsr Protocol To Prevent Black Hole Attacks In Manets”, International Journal Of Computer Applications Vol 7– No.11, October 2010, Pp.15-19.
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, JohnDixon, and Kendall Nygard, “Prevention of Cooperative BlackHole Attack in Wireless Ad Hoc Networks”, 2003 International Conference on Wireless Networks (ICWN “03), Las Vegas,Nevada, USA.
E. A. Mary Anita and V. Vasudevan, Black Hole attack Prevention in multicast routing Protocols For MANETs Using Certificate Chaining, IJCA, Vol.1, No.12, pp. 22–29, 2010.
Tamilselvan, L. Sankaranarayanan, V. “Prevention of Black hole Attack in MANET”, Journal of Networks, Vol.3, No.5, May 2008.
D. Djenouri, L. Khelladi and N. Badache, A Survey of SecurityIssues in Mobile Ad Hoc and Sensor Networks, IEEE Communication Surveys & Tutorials, Vol. 7, No. 4, 2005.
Marti, S., Giuli, T. J., Lai, K., & Baker, M.(2000),Mitigating routing misbehavior in mobile ad-hoc networks, Proceedings of the6th International Conference on Mobile Computing and Networking (MobiCom), , pp. 255-265.
Yi-Chun Hu, Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy, 1540-7993/04/$20.00 © 2004 IEEE, May/June 2004.
Mahesh K. Marina Samir R. Das , On-demand Multipath Distance Vector Routingin Ad Hoc Networks- WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2006; 6:969–988Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/wcm.432.
Hesiri Weerasinghe and Huirong Fu, Member of IEEE, Preventing Cooperative Black Hole Attacks in Mobile Adhoc Networks: Simulation Implemention and Evaluation,IJSEA,Vol2,No.3,July 2008.
Yu, K.M, Yu, C.W, Yan, S.F. 2009. An Ad Hoc Routing Protocol with Multiple Backup Routes. In Proc. Springer Science+Business Media LLC. 1 November 2009
Tsou P-C, Chang J-M, Lin Y-H, Chao H-C, Chen J-L(2011) Developing a BDSR Scheme to Avoid BlackHole Attack Based on Proactive and Reactive Architecture in MANETs.
NS2 tutorial, www.isi.edu/nsnam/ns/tutorial.
Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, ”Securing Mobile Ad Hoc Networks with Certificateless Public Keys”, IEEE transactions on dependable and secure computing, vol. 3, no. 4,october-december 2006
Kimaya Sanzgiri, Daniel LaFlamme, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M.Belding-Royer, “Authenticated Routing for Ad-Hoc networks”, IEEE Journal on selected areas in communications, Vol.23, No. 3, March 2005.
Yih-Chun HU, Adrian Perrig, “A survey of secure wireless ad hoc routing” In IEEE Security & Privacy,2004.
Nikola Milanovic, Miroslaw Malek, Anthony Davidson, Veljko Milutinovic, “Routing and Security in Mobile Ad-hoc network”, IEEE Computer Society,Feb. 2004.
Loay Abusalah, Ashfaq Khokhar, Mohsen Guizani, “A survey of secure Mobile Ad hoc routing Protocol”IEEE Communication Survey & Tutorials, Vol 10,No.4, 2008. [18] Eduardo da silva, Aldri l. dos Santos, and Luiz Carlos p. albini, “ID-Based Key Management in Mobile Adhoc Networks: Techniques and Application”, IEEE wireless communication, pp 46-52, October 2008.
W. Liu and Y. Fang, “SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks,” Proc.IEEE INFOCOM 2004.
Y. Desmedt and Y. Frankel, “Threshold Cryptosystems,” Proc. CRYPTO ’89, pp. 307-315,Aug. 1989