Study of detecting and overcoming black hole attacks in MANET: A Review

被引:0
作者
Khan, Danista [1 ]
Jamil, Mah Zaib [2 ]
机构
[1] Univ Lahore, Dept Elect Engn, Lahore, Pakistan
[2] Punjab Forens Agcy, Lahore, Pakistan
来源
2017 INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS AND NETWORKS (ISWSN) | 2017年
关键词
MANET; AODV protocol; black hole; security attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Ad-hoc Networks (MANETs) are networks in which nodes configure themselves in dynamic topology without any centralized system. MANET's nodes communicate with each other by forming a dynamic wireless link without using previous infrastructure. In the MANETs any node can enter or leave a network at any time. Nodes can send or receive the data by using defined routing protocols and mobility models. Due to the unavailability of centralized system, MANETs are exposed to different network layer attacks. Worm Hole, Black Hole, Gray Hole, Byzantine and Sybil Attacks are some of the examples of network layer attacks, which destroys network topology resulting in data loss and network degradation. In the Black Hole Attack, a node proclaims itself as having closest paths to all the destinations. This node absorbs all the data packets of network by exploiting the routing protocol thus degrading network performance. In this Paper, we have discussed different techniques that can be used to detect and prevent MANETs from black hole attacks.
引用
收藏
页数:4
相关论文
共 22 条
  • [1] Alkatheiri M. S., 2011, 2011 IEEE 13th International Conference on Communication Technology (ICCT), P614, DOI 10.1109/ICCT.2011.6157949
  • [2] Arora SK, 2014, 2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), P406, DOI 10.1109/CONFLUENCE.2014.6949297
  • [3] A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET
    Babu, M. Rajesh
    Usha, G.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 831 - 845
  • [4] Bhole Ashish T., 2012, INT J ENG INNOVATIVE, V2
  • [5] BISWAS S, 2014, APPL INNOVATIONS MOB, P157
  • [6] CHAUBEY N, 2015, ADV COMP COMM TECHN, P320, DOI DOI 10.1109/ACCT.2015.62
  • [7] Chirala A. P, 2010, IJCA MOBILE AD HOC N, P105
  • [8] Chopde Nitin R., 2014, INT J ENG TRENDS TEC, V9, P394
  • [9] Corson S., 1999, 2501 IETF RFC
  • [10] Diwaker Chander, INT J SOFTWARE WEB S