Skip to main content
Log in

A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless network in which the mobile nodes operate in a distributed manner and collaborate with each other in order to provide the multi-hop communication between the source and the destination node. Generally, the main assumption considered in the MANET is that each node is a trusted node. However, in a real scenario, there are some unreliable nodes which misbehave and launch the attack in network like black-hole in which the misbehaving nodes attract all the traffic towards itself by giving false information of having a shortest path towards the destination with a very high destination sequence number. In this paper, we discussed different possible nature of the nodes in the network that can lead to the different possible attacks. We have also presented the different classification of the techniques and discussed the merits, drawbacks, and suitability of the various techniques in different scenarios which need to be taken into consideration while designing an efficient protocol.

Graphical Abstract

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle River: Prentice Hall PTR.

    Google Scholar 

  2. Perkins, C. E., Beliding-Royer, E., & Das, S. (2004). Ad hoc on-demand distance vector (AODV) routing. Roma: IETF Internet Draft, MANET working group.

    Google Scholar 

  3. Johnson, D. B., Maltz, D. A., & Hu, Y.-C. (2004). The dynamic source routing protocol for mobile ad-hoc network (DSR). Roma: IETF Internet Draft.

    Google Scholar 

  4. Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad-hoc networks: A survey. In IEEE 2nd international conference on advanced computing & communication technologies.

  5. Gurung, S., & Chauhan, S. (2019). Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wireless Networks, 25(3), 975–988. https://doi.org/10.1007/s11276-017-1639-2

    Article  Google Scholar 

  6. Gurung, S., & Chauhan, S. (2018). A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Networks, 24(8), 2957–2971. https://doi.org/10.1007/s11276-017-1514-1

    Article  Google Scholar 

  7. Sangi, A. R., Liu, J., & Zou, L. (2009). A performance analysis of aodv routing protocol under combined byzantine attacks in manets. In Computational intelligence and software engineering. CiSE 2009. International conference on (pp. 1–5). Piscataway: IEEE.

  8. Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE international conference on WiSPNET (pp. 2409–2415).

  9. Li, C., Wang, Z., & Yang, C. (2010). SEAODV: A security enhanced AODV routing protocol for wireless mesh networks. Transactions on computational science XI (pp. 1–16). Berlin: Springer.

    Google Scholar 

  10. Dhanalakshmi, K. S., Kannapiran, B., & Divya, A. (2014). Enhancing manet security using hybrid techniques in key generation mechanism. In Electronics and communication systems (ICECS), international conference on (pp. 1–5). Piscataway: IEEE.

  11. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). New York City: ACM.

  12. Medadian, M., Yektaie, M. H., & Rahmani, A. M. (2009, November). Combat with black hole attack in AODV routing protocol in MANET. In Internet, 2009. AH-ICI 2009. First Asian himalayas international conference on (pp. 1–5). Piscataway: IEEE.

  13. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security,5(3), 338–346.

    Google Scholar 

  14. Raj, P. N., & Swadas, P. B. (2009). DPRAODV: A dyanamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science,2(3), 54–59.

    Google Scholar 

  15. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP,11(1), 1–121.

    Google Scholar 

  16. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in aodv based manets. In International conference on advances in communication, network, and computing (pp. 60–67). Berlin: Springer.

  17. Tan, S., & Kim, K. (2013). Secure route discovery for preventing black hole attacks on AODV-based MANETs. In ICT convergence (ICTC), 2013 international conference on (pp. 1027–1032). Piscataway: IEEE.

  18. Salunke, A., & Ambawade, D. (2015). Dynamic sequence number thresholding protocol for detection of blackhole attack in wireless sensor network. In Communication, information & computing technology (ICCICT), 2015 international conference on (pp. 1–4). Piscataway: IEEE.

  19. Kumar, J., Kulkarni, M., Gupta, D., & Indu, S. (2015). Secure route discovery in AODV in presence of blackhole attack. CSI transactions on ICT,3(2–4), 91–98. https://doi.org/10.1007/s40012-016-0075-2.

    Article  Google Scholar 

  20. Gurung, S., & Chauhan, S. (2017). A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Networks. https://doi.org/10.1007/s11276-017-1514-1.

    Article  Google Scholar 

  21. Balakrishnan, K., Deng, J., & Varshney, V. K. (2005, March). TWOACK: Preventing selfishness in mobile ad hoc networks. In Wireless communications and networking conference, 2005 IEEE (Vol. 4, pp. 2137–2142). Piscataway: IEEE.

  22. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.

    Article  Google Scholar 

  23. Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Mouftah, H. (2010, April). AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In Advanced information networking and applications (AINA), 2010 24th IEEE international conference on (pp. 634–640). Piscataway: IEEE.

  24. Dhiman, D., & Sood, N. (2014, December). Enhanced 2ACK scheme for reducing routing overhead in MANETs. In Parallel, distributed and grid computing (PDGC), 2014 international conference on (pp. 120–125). Piscataway: IEEE.

  25. Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications,35(3), 1130–1139.

    Article  Google Scholar 

  26. Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine,40(10), 70–75.

    Article  Google Scholar 

  27. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., & Nygard, K. E. (2003, June). Prevention of cooperative black hole attack in wireless ad hoc networks. In International conference on wireless networks (Vol. 2003, pp. 570–575).

  28. Yu, C. W., Wu, T. K., Cheng, R. H., & Chang, S. C. (2007, May). A distributed and cooperative black hole node detection and elimination mechanism for ad hoc networks. In Pacific-Asia conference on knowledge discovery and data mining (pp. 538–549). Berlin: Springer.

  29. Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking (Vol. 2, pp. 362-367). IEEE.

  30. Dorri, A., & Nikdel, H. (2015, May). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In Information and knowledge technology (IKT), 2015 7th conference on (pp. 1–6). Piscataway: IEEE.

  31. Peng, G., & Chuanyun, Z. (2006). Routing attacks and solutions in mobile ad hoc networks. In Communication technology, 2006. ICCT’06. International conference on (pp. 1–4). Piscataway: IEEE.

  32. Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security,6(2), 77–83.

    Article  Google Scholar 

  33. Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec–using reputation-based multilayer security to protect MANETs. Computers & Security,31(1), 122–136.

    Article  Google Scholar 

  34. Kumari, S. V., & Paramasivan, B. (2015, April). Ant based defense mechanism for selective forwarding attack in MANET. In Data engineering workshops (ICDEW), 2015 31st IEEE international conference on (pp. 92–97). Piscataway: IEEE.

  35. Fahad, T., Djenouri, D., & Askwith, R. (2007, August). On detecting packets droppers in manet: A novel low cost approach. In Information assurance and security, 2007. IAS 2007. Third international symposium on (pp. 56–64). Piscataway: IEEE.

  36. Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K., & Banerjee, P. K. (2012, August). Two-level secure re-routing (TSR) in mobile ad hoc networks. In Advances in mobile network, communication and its applications (MNCAPPS), 2012 international conference on (pp. 119–122). Piscataway: IEEE.

  37. Shi, F., Liu, W., Jin, D., & Song, J. (2014). A cluster-based countermeasure against blackhole attacks in MANETs. Telecommunication Systems,57(2), 119–136.

    Article  Google Scholar 

  38. Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013, April). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Information & communication technologies (ICT), 2013 IEEE conference on (pp. 479–484). Piscataway: IEEE.

  39. Singh, M., & Singh, P. (2016, August). Black hole attack detection in MANET using mobile trust points with clustering. In International conference on smart trends for information technology and computer communications (pp. 565–572). Singapore: Springer.

  40. Su, M. Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications,34(1), 107–117.

    Article  Google Scholar 

  41. Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering,40(2), 530–538.

    Article  Google Scholar 

  42. Barani, F. (2014). A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system. In Intelligent systems (ICIS), 2014 Iranian conference on (pp. 1–6). Piscataway: IEEE.

  43. Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray-hole attack in MANET. Wireless Networks,24(2), 565–579.

    Article  Google Scholar 

  44. Lee, S., Han, B., & Shin, M. (2002). Robust routing in wireless ad hoc networks. In Parallel processing workshops, 2002. Proceedings international conference on (pp. 73–78). Piscataway: IEEE.

  45. Tamilselvan, L., & Sankaranarayanan, V. (2007). Prevention of blackhole attack in MANET. In Wireless broadband and ultra wideband communications, 2007. AusWireless 2007. The 2nd international conference on (pp. 21–21). Piscataway: IEEE.

  46. Dokurer, S., Erten, Y. M., & Acar, C. E. (2007). Performance analysis of ad-hoc networks under black hole attacks. In SoutheastCon, proceedings on (pp. 148–153). Piscataway: IEEE.

  47. Lu, S., Li, L., Lam, K. Y., & Jia, L. (2009). SAODV: A MANET routing protocol that can withstand black hole attack. In Computational intelligence and security, 2009. CIS’09. International conference on (Vol. 2, pp. 421–425). Piscataway: IEEE.

  48. Mistry, N., Jinwala, D. C., & Zaveri, M. (2010). Improving AODV protocol against blackhole attacks. In Proceedings of the international multi conference of engineers and computer scientists (Vol. 2).

  49. Ameza, F., Assam, N., & Beghdad, R. (2010). Defending AODV routing protocol against the black hole attack. International Journal of Computer Science and Information Security,8(2), 112–117.

    Google Scholar 

  50. Yerneni, R., & Sarje, A. K. (2012). Enhancing performance of AODV against black hole attack. In Proceedings of the CUBE international information technology conference (pp. 857–862). New York City: ACM.

  51. Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal,9(1), 65–75.

    Article  Google Scholar 

  52. Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks,21(8), 2781–2798.

    Article  Google Scholar 

  53. Gurung, S., & Saluja, K. K. (2014). Mitigating impact of blackhole attack in MANET. In International conference on recent trends in information, telecommunication and computing, ITC (pp. 229-237).

  54. Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks,113, 94–110.

    Article  Google Scholar 

  55. Pu, C., Lim, S., Chae, J., & Jung, B. (2017). Active detection in mitigating routing misbehavior for MANETs. Wireless Networks. https://doi.org/10.1007/s11276-017-1621-z.

    Article  Google Scholar 

  56. Delkesh, T., & Jamali, M. A. J. (2018). EAODV: Detection and removal of multiple black hole attacks through sending forged packets in MANETs. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-018-0782-7.

    Article  Google Scholar 

  57. Ndajah, P., Matine, A. O., & Hounkonnou, M. N. (2018). Black-hole attack prevention in wireless peer to peer networks: A new strategy. International Journal of Wireless Information Networks. https://doi.org/10.1007/s10776-018-0418-z.

    Article  Google Scholar 

  58. Veeraiah, N., & Krishna, B. T. (2019). Trust-aware FuzzyClus-Fuzzy NB: Intrusion detection scheme basedon fuzzy clustering and Bayesian. https://doi.org/10.1007/s11276-018-01933-0.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shashi Gurung.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gurung, S., Chauhan, S. A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wireless Netw 26, 1981–2011 (2020). https://doi.org/10.1007/s11276-019-01966-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-019-01966-z

Keywords

Navigation