• Corpus ID: 55993527

Black Hole Attacks in Mobile Ad Hoc Networks

  title={Black Hole Attacks in Mobile Ad Hoc Networks},
  author={Reza Amiri and Marjan Kuchaki Rafsanjani and Ehsan Khosravi and Hadis Amiri},
  journal={journal of new results in science},
Mobile ad hoc networks are used on different occasions, especially during crises. In risk and crisis management, communications is considered vital. With regard to their features, mobile ad hoc networks can be very helpful when dealing with a crisis such as flood, earthquake, war, etc. Security is nowadays considered as one of the main concerns in mobile ad hoc networks. And blac khole attack is among the most important threats of mobile ad hoc networks, where the malicious node places itself… 
Detecting and preventing black hole and wormhole attacks in wireless biosensor network using path assignment protocol
This paper proposes a rapid response round trip time mechanism to detect the black hole and wormhole attacks and the path assignment protocol used to reduce those attacks and produce the higher efficiency and throughput with cost-effective.


Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection
  • Yibeltal F. Alem, Z. Xuan
  • Computer Science
    2010 2nd International Conference on Future Computer and Communication
  • 2010
A proposed solution based on Intrusion Detection using Anomaly Detection (IDAD) to prevent black hole attacks imposed by both single and multiple black hole nodes against mobile ad-hoc networks is proposed.
A Novel Security Approach for Detecting Black Hole Attack in MANET
A novel approach is proposed to detect blackhole nodes in the MANET and the simulations show that the proposed approach is efficient than normal AODV when the black hole attack is present with high packet delivery and less packet drop.
Geographic routing used in MANET for black hole detection
The work proposed in this paper contributes to detect the black hole attack using Modified Associativity Based Routing protocol (MABR) which is the modification and improvement of ABR.
Enhancing data security in ad hoc networks based on multipath routing
This study focuses on improving the flow transmission confidentiality in ad hoc networks based on multipath routing by taking advantage of the existence of multiple paths between nodes in an ad hoc network to increase the confidentiality robustness of transmitted data.
A survey on detecting black hole attack in AODV-based mobile ad hoc networks
  • R. A. Raja Mahmood, A.I. Khan
  • Computer Science
    2007 International Symposium on High Capacity Optical Networks and Enabling Technologies
  • 2007
Seven detection methods of detecting black hole attack against ad hoc on-demand distance vector routing protocol in mobile ad hoc networks are presented and their strengths and weaknesses discussed.
Detecting blackhole attacks on DSR-based mobile ad hoc networks
Simulation results are provided, showing that the proposed DBA-DSR scheme outperforms DSR in terms of packet delivery ratio and network throughput, chosen as performance metrics, when blackhole nodes are present in the network.
Preventing Blackhole Attack in DSR-Based Wireless Ad Hoc Networks
This paper proposed a scheme to prevent blackhole attacks in wireless ad hoc networks which consists of three mechanisms which are trust management mechanism, detection mechanism and location mechanism.
Black Hole Combat Using Node Stability System in MANET
A Node Stability System (NSS) is used to propose methods of identification of singular and co-operative Black hole nodes and provide steps to recover the network from such vulnerabilities.
A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks
The Blackhole and its variant Co-operative Blackhole are some of the deadliest security threats in wireless mobile ad hoc networks as they are very difficult to handle due to the ineffectiveness of the traditional security mechanisms in case of MANET.
Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks
This paper proposes a complete protocol for detection & removal of networking Black/Gray Holes in mobile ad hoc networks.