In this research, Message Authentication Code (MAC) based black hole attack detection and reaction scheme is proposed that can be used to guard against black hole nodes in MANETs. The nodes can try to attack the network by conducting malicious transactions, or spreading viruses and worms, or attacking known vulnerabilities. The proposed scheme tries to predict the future behaviour of a node by observing its past behavior. It is believed that the proposed scheme will have a positive impact in malicious node detection and prevention for wireless mobile ad hoc networks.
ABSTRACT: This paper represents a method of detecting black-hole attack in mobile ad hoc networks, which are extremely vulnerable to attacks compared to conventional wired networks due to its mobility and broadcast in nature. In this case black-hole attacks can be easily deployed by the adversary. To defend against this attack, we use an approach to detect whether there is present a black hole and a path (routing) recovery protocol to set up a correct path for the real destination. Our method has a remarkable advantage that it can be implemented with a slight modification in basic AODV protocol without much affecting the efficiency, throughput and end to end delay. This is one of the efficient methods that can find out black hole node if any exist in the network.
Mobile Ad Hoc Network (MANET) is a major next generation wireless technology which is mostly used in future. MANET is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predefine organization of available links. In a MANET mobile node will be expandable and transferable, so that attacker will be attack by a malicious node which brings great challenges to the security of Mobile Ad Hoc network. The Black hole attack is one of such security issue in MANET. Our focus is specifically is on ensuring the security against the Black hole attack with the help of the popular routing protocol which is mostly used in MANET. Mobile Ad hoc Networks (MANET) are the extension of the wireless networks. They plays important role in real life applications such as military applications, home applications etc. these networks are exposed by a lot of security attacks such as alteration, Denial of service attack, Fabrication attack etc. Black hole attack is one of the dangerous active attacks on the MANET. In this research paper an well- organized access for the detection and removal of the Black hole attack in the Mobile Ad Hoc Networks (MANET) is described. The algorithm is implemented on AODV (Ad hoc on demand Distance Vector) Routing protocol. The algorithm can detects both the single Black hole attack and the Cooperative Black hole attack. Keywords: AODV,BLACK HOLE ATTACK,MANET,NS-3,RREP.
Malicious node attacks all RREQ messages this way and takes over all routes. Therefore all packets are sent to a point when they are not forwarding anywhere. This is called a black hole akin to real meaning which swallows all objects and matter. To succeed a black hole attack, malicious node should be positioned at the center of the wireless network. If malicious node masquerades false RREP message as if it comes from another victim node instead of itself, all messages will be forwarded to the victim node. By doing this, victim node will have to process all incoming messages and is subjected to a sleep deprivation attack .
However in case the SN gets an RREP for the RIP, then it means that, there is a black hole in that route. In this case the SN initiates the process of Black Hole detection. The SN at the beginning notifies the neighbours of the node from which it got the RREP to RIP, to enter in to promiscuous form, to make sure they pay attention not simply to the actual packet bound to them, but likewise to the packet bound to the defined Destination node. Now the SN sends a small number of artificial data packets to the destination, while the neighbouring nodes start off keeping track of the packet flow. These kinds of neighboring nodes further send out the monitor message to the next hop of the artificial data packet & so on. At a point when the monitoring nodes finds out that the artificial data packet loss is way more than the standard anticipated loss in a network, it informs the SN about this particular Intermediate Node(IN). This time with regards to the critical information received by the various monitoring nodes, the SN detects the location of the Black Hole.
In this paper we present the formation of black hole and general detail on black hole. A black hole is a place where gravity has gotten so strong that the escape velocity is faster than light. Einstein’s general theory of relativity predicts that gravity should appears in its purest form in two ways; In vibration of space time called gravitational waves and in dens knots of curved space time. The true black hole revolution occurred only with Einstein theory of general relativity in 1915. There is no limit to the size of a black hole. It can be as heavy as few billions suns. According to the general relativity, now rotating black hole must be very simple, their size depends on their mass and any two such black holes with the same mass were identical.
In this attack, a pernicious node acts as a black- hole to lure all the traffic in the sensor network. Particularly in a flooding based convention, the assailant listens to demands for routes then answers to the target nodes that it holds the high caliber to the base station. Once the malicious device has capacity to embed itself between the communicating nodes, it is able to do anything with the packets passing between them. Indeed, this attack can influence even the nodes those are extensively a long way from the base stations.
As can be seen in Fig. 5 and Fig. 6, firstly, after inserting a black hole, the packet loss rate of link 7 (from node 8 to 27), link 5 (from node 7 to 10) and link 2 (from node 6 to 3) is 1, and the time delay is 0. This is because the node 8 and 6 are start nodes of link 7 and link 5 respectively, and all packets will flow to the black hole node and be dropped when there is a black hole node near the start node. After inserting a black hole near node 8, the packet loss rate of link 5 which link have to pass by node 8 change to 1, and the time delay change to 0. Secondly, we can see the three lines from Fig. 5 that the packet lose rate of each link after inserting a black hole near key node 8 and normal node 6 has increased either, but the packet lose rate of each link near key node 8 increased many times to normal node 6 after inserting a black hole. Thirdly, we can see from Fig. 7 that the time delay of each link after inserting a black hole near key node 8 and normal node 6 has decreased either, but the time delay of each link after inserting a black hole near key node 8 decreased much more. This is because the black hole nodes made the packet drop rate of network increase to varying degrees while the time delay of each node basically unchanged, and the number of successfully received data packets is reduced, the total delay will inevitably be reduced.
∆ + ⋅ ∆ + = which we state would be due our construction a necessary condition for a complete quantum gravity analysis of gravitons being emitted from a Kerr-Newman black hole. We state that these two points have to be determined and investigated, and also that an optimal value of d , for dimen- sions for a problem, involving Kerr Newman black holes would have to be as- certained in future research. Finally, we refer the reader to references - or additional ideas which may be used in future projects. Note also that Valev wrote 
28 Read more
Abstract: In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this context, preventing or detecting malicious nodes launching grayhole or collaborative blackhole attacks is a challenge. This paper attempts to resolve this issue by designing a Trusted AODV-based routing mechanism that integrates the advantages of both proactive and reactive defense architectures. Our method implements a route tracing technique to help in achieving the stated goal to detect black hole attack, we also include the detection of gray hole attack which the Gray- Hole attack, malicious nodes try to stop the packets in the network by refusing to forward or drop the packets passing through them for considerable periods. Each intermediate node within the range.
Routing protocol can lead to different malicious behaviors, like modifying routes, dropping a packet, forging of routing control messages. That’s why intruder targets the routing protocols to attack MANET. By attacking routing protocol, alone MANET can be attacked in many ways; like Hello Flooding Attack, wormhole attack, Location-Disclosure, Rushing Attacks, Invisible Node, and Routing Table Attack. Black Hole attack is another attack that disrupts networks data traffic flow. Hence a mobile ad hoc network needs a secure routing protocol to have reliable data flow from source to destination.
A Temporal table Authenticated Routing Protocol for Ad hoc networks, In this, temporal table based techniques are applied on the ARAN protocol to detect selfish nodes and improve the performance. ARAN–authenticated routing protocol is a secure protocol which provides security for attacks using modification, fabrication, impersonation and securing shortest paths.In, Marti et al, proposed a scheme that contains two major modules, termed as Watchdog and Path rater to detect & mitigate respectively. As it rely on overhearing, the Watchdog may fail to detect misbehavior of the node or raise false alarms. CONFIDANT Scheme observes the next hop neighbors behavior using the over hearing technique. This scheme causes same problems as the Watchdog Scheme. S.Bansal et al, proposed an observation based Co-Operation enforcement in Ad hoc Networks (OCEAN) .In contrast to CONFIDANT, OCEAN avoids in direct (second hand) reputation information & uses only direct first hand observation of other nodes behavior. Temporal table is more efficient and more secure than ARAN secure routing protocol in defending against both malicious and authenticated selfish nodes.BDA- DSR, a protocol that proposed a scheme that detects and avoids the black hole node in the network before the actual routing starts by using fake RREQ packets. The protocol is an extended version of DSR. The fake RREQ packets are send before the routing process starts in order
Vipul Sharma et al proposed the mechanism for the detection of black hole attack in Leach based sensor networks. The clusters are created from the sensor nodes on the basis of signal strength.The leach protocol is initiated to elect the cluster head for each round. Each sensor node in the particular cluster has the probability to be selected as the cluster head using the leach protocol . It is an energy efficient cluster based hierarchy routing protocol. Base station maintain the ids of the cluster head at each round and if the cluster head repeats represents the network is under black hole attack. Base station sends the alert packet to the sensor nodes.If the cluster head is not repeated there is no black hole node in the network and the data transmission across network successfully. The proposed model is detecting whether the cluster head is the black hole node or not and it will not detect the sensor nodes as a black hole node.
As already mentioned in the previous papers, the solutions have been proposed by using various techniques to attempt to detect the single Black Hole and co-operative black hole nodes. After detecting these black hole nodes, the data packets had not being send through this route (i.e. to avoid black hole nodes) or remove from the network. In this research paper we proposed a EAODV protocol that is enhancement of basic AODV.We compared the propose solution with basic AODV and already proposed work. By doing this we get the better result as compared to other solutions. Our proposed solutions firstly detect the Black Hole node then wait if this node sends the BI then consider it authorized node otherwise eradicate from the network. The solution is simulated using NS2 and is found to achieve the better security with minimal delay and overhead. The packet delivery ratio is also increase due this proposed solution. The future work is to practically implement.
Author Sanjay K. Dhurandher, Isaac Woungang, Raveena Mathur and Prashant Khurana (2013) proposed “GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs”. It means Gratuitous (give freely) AODV. Here it diverts the traffic from the Black Hole. The control packets such as CONFIRM, CHKCNFIRM and REPLYCNFIRM are used to detect the presence of Black Hole and divert all the traffic. Active attacks=malicious node can enter and modify or corrupt it. Passive attacks=the malicious node listens the traffic and remove or extracts the data from the ongoing transmissions. Algorithm 1
In this project we have compared normal AODV and AODV having blackhole attack. According to throughput graphs we can conclude that, at DSSS rate 5.5 mbps and hello interval range within 2.5s to 3.0s we get good results because here packet loss is low as compared to other result set. So, here we have tried to minimize the packet loss in the network having black hole attack .
Authors Proff. Sanjeev Sharma et al  proposed a technique to detection of the black hole attack in manet called Secure-ZRP protocol which can used to prevent from black holes in zones and out zones. Authors divided the security in two group (a) local communication attack, inside the zones (b) when inter zone communication, outside the zones. In local communication source node broadcast the bluff probe packet. This contains the address of the destination but in actual this is the address of non existence node. This message is directly revised by the neighbor node. If the malicious node present in the zone it will give immediate response to the source node.
11 Read more
The proposed algorithm Secure AODV protocol is used to mitigate the black holes and warm holes in a Manet. At first a standard network is created with a AODV protocol then an attacker implementation is done without security and later an attacker implementation with a security is done. And then performance measures such as Through put, packet delivery. Then a Secure AODV protocol with security mechanism to avoid the implemented attack and transfer packets from sender to receive and performance measures are done for the secure AODV protocol.
ABSTRACT Wireless Sensor Network has become one of the most emerging areas of research in recent days. WSNs have been applied in a variety of application areas such as military, traffic surveillance, environment monitoring and so on. Since WSN is not a secure network and each sensor node can be compromised by the intruder. There are plenty of security threats in sensor networks like Black hole Attack, Wormhole attack, Sinkhole attack. Recently, there are so many algorithms are proposed to detect or to prevent attack by the researchers. Still, the research is continuing to evaluate sensor nodes' trust and reputation. At present to monitor nodes’ behavior direct and indirect trust values are used and most of the detection method uses additional nodes to detect an attack. These method increases the cost and also overhead. This paper proposed a method which detects the Black hole attack without using any additional node to monitor the network. The proposed work uses Attacker Detection metric (AD metric) to detect malicious node based on the average sequence number, time delay and reliability. OLSR protocol is used for routing which improves the network lifetime by minimizing the packet flooding. Besides, to ensure reliable data transmission Elliptical Curve Digital Signature Algorithm is used. Simulation results are obtained and show malicious nodes are eliminated using AD metrics
They are simple and easy to deploy and maintain. In addition, the limited emulation available and/or allowed on interaction honey pots reduces the potential risks brought about using them in the field. However, with interaction honey pots, unlimited information can be obtained, and it is possible that experienced attackers will not come to recognize a honey pot when they come across one. We estimate the collision of alert Black hole attacks on network protocols such as TCP and routing. Our findings show that a selective Black hole can widely impact performance with very low effort. We developed schemes that alter a Black hole to a unsystematic single by prevent real-time packet categorization.