A Review of Blackhole Attack in Mobile Adhoc Network

被引:0
|
作者
Mandala, Satria [1 ]
Abdullah, Abdul Hanan [2 ]
Ismail, Abdul Samad [2 ]
Haron, Habibollah [2 ]
Ngadi, Md. Asri [2 ]
Coulibaly, Yahaya [2 ]
机构
[1] UTM, MaGIC X Media & Game Innovat Ctr Excellence, UTM IRDA Digital Media Ctr, Skudai Johor, Malaysia
[2] UTM, Fac Comp, Dept Comp Sci, Skudai Johor, Malaysia
关键词
Security; MANET; Blackhole Attack on AODV; Secure Routing; Intrusion Detection on MANET; AD-HOC; SECURITY; ALGORITHM; NODES; AODV;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Mobile ad hoc network (MANET) is used in a wide range of application from civilian usage to military battlefield communications. Using multi-hop communication model, a source node can directly communicate with the destination node without infrastructure. Unfortunately, this feature causes the network vulnerable to various attacks. Security preventions implemented in the traditional wired network are unsuitable for MANET. This paper studies several types of attacks, and then discusses one of the most severe attack in the network, blackhole attack. Furthermore, recent efforts for preventing the blackhole attack are comprehensively discussed. Study of literature indicates that the prevention of the blackhole attack can be categorized into three groups, i.e., Protection based on Cryptography, Protocol Modification, and Intrusion Detection and Counter Measure.
引用
收藏
页码:339 / 344
页数:6
相关论文
共 50 条
  • [1] Detecting and Overcoming Blackhole Attack in Mobile Adhoc Network
    Jain, Sakshi
    Khuteta, Ajay
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 225 - 229
  • [2] A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
    Li, Guoquan
    Yan, Zheng
    Fu, Yulong
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [3] Detection Techniques of Blackhole Attack in Mobile Adhoc Network- A Survey
    Jain, Sakshi
    Khunteta, Ajay
    [J]. ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [4] Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks
    Mandala, Satria
    Jenni, Kommineni
    Ngadi, Md Asri
    Kamat, Maznah
    Coulibaly, Yahaya
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 57 - 67
  • [5] Machine learning models to detect the blackhole attack in wireless adhoc network
    Nagalakshmi, T. J.
    Gnanasekar, A. K.
    Ramkumar, G.
    Sabarivani, A.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2021, 47 : 235 - 239
  • [6] An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network
    Kumar, Vimal
    Kumar, Rakesh
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 472 - 479
  • [7] Review on Sinkhole Detection Techniques in Mobile Adhoc Network
    Gandhewar, Nisarg
    Patel, Rahila
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 1, 2012, 130 : 535 - 548
  • [8] Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network
    G. Arulkumaran
    R. K. Gnanamurthy
    [J]. Mobile Networks and Applications, 2019, 24 : 386 - 393
  • [9] Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network
    Arulkumaran, G.
    Gnanamurthy, R. K.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (02): : 386 - 393
  • [10] Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric
    Singh, Moirangthem Marjit
    Mandal, Jyotsna Kumar
    [J]. 2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 565 - 569