A SURVEY – DETECTION AND REMOVAL OF BLACKHOLE ATTACK IN MANET
Keywords:
MANET, BLACKHOLE, ATTACKAbstract
Communication networks are often used to transfer vital and confidential information for a variety of purposes, and if we do not update our networks to cope up with the latest challenges, the networks may remain vulnerable, as a consequence may attract the attention of mischievous users to disrupt or destroy the information flow. This has led to heightened awareness of the need to become aware of the current developments in network technologies to protect data and resources from disclosure. Some attacks on networks are planned and specifically targeted, whereas others may be opportunistic, resulting from eavesdropping activities. Further, the threats to network are continually increasing with discovery of new issues, and solutions to counter those issues are needed. With this workshop attempts will be made to provide an insight into the enduring principles of network communication, routing, security and their implementations.
References
Shashi Gurung, Aditya Kumar, Krishan Kumar Saluja, “Survey of Black Hole Attack Detection in Mobile Adhoc Networks” in Proceedings of International Joint Conference, 7th July 2013, Goa, India, ISBN: 978-81-927147-7-6.
Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao, “A Survey of Black Hole Attacks in Wireless Mobile Ad Hoc Networks” in Human-centric Computing and Information Sciences, 2011, 1:4.
Rohit Pal, Mukesh Azad, Santosh Kumar, “An Approach to Combat the Blackhole Attack in AODV Routing Protocol” in International Journal of Computer Applications (0975 – 8887), Volume 77 – No. 11, September 2013.
Kamarularifin Abd. Jalil, Zaid Ahmad, Jamalul-Lail Ab Manan, “Mitigation of Black Hole Attacks for AODV Routing Protocol” in International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(2): 336-343, The Society of Digital Information and Wireless Communications, 2011 (ISSN: 2220-9085).
S.V. Shirbhate, Dr. S.S. Sherekar, Dr. V.M. Thakare, “A Novel Framework of Dynamic Learning Based Intrusion Detection Approach in MANET” in International Conference on Computing Communication Control and Automation, 2015.
C.E. Perkins, E.M. Royer, "Ad-hoc On-Demand Distance Vector Routing," Mobile Computing Systems and Applications, 1999. Proceedings, WMCSA '99. Second IEEE Workshop on, vol., no., pp. 90-100, 25-26 Feb 1999.
C.E. Perkins, E.M.B. Royer, S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” IETF Internet Draft, MANET working group, Jan. 2004.
H. Deng, W. Li, and D.P. Agrawal, "Routing Security in Wireless Ad Hoc Networks," Communications Magazine, IEEE, vol. 40, no. 10, pp. 70-75, October 2002.
B. Sun, Y. Guan, J. Chen and U. Pooch, “Detecting Black Hole Attack in Mobile Ad Hoc Networks”. Paper presented at the 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22-25 April 2003.
S. Ramaswamy, H. Furong, M. Sreekantaradhya, J. Dixon and K. Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”. Paper presented at the International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003.
Downloads
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.