TY - GEN
T1 - Study of detecting and overcoming black hole attacks in MANET: A review
T2 - 2017 International Symposium on Wireless Systems and Networks, ISWSN 2017
AU - Khan, Danista
AU - Jamil, Mahzaib
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/7/1
Y1 - 2017/7/1
N2 - Mobile Ad-hoc Networks (MANETs) are networks in which nodes configure themselves in dynamic topology without any centralized system. MANET's nodes communicate with each other by forming a dynamic wireless link without using previous infrastructure. In the MANETs any node can enter or leave a network at any time. Nodes can send or receive the data by using defined routing protocols and mobility models. Due to the unavailability of centralized system, MANETs are exposed to different network layer attacks. Worm Hole, Black Hole, Gray Hole, Byzantine and Sybil Attacks are some of the examples of network layer attacks, which destroys network topology resulting in data loss and network degradation. In the Black Hole Attack, a node proclaims itself as having closest paths to all the destinations. This node absorbs all the data packets of network by exploiting the routing protocol thus degrading network performance. In this Paper, we have discussed different techniques that can be used to detect and prevent MANETs from black hole attacks.
AB - Mobile Ad-hoc Networks (MANETs) are networks in which nodes configure themselves in dynamic topology without any centralized system. MANET's nodes communicate with each other by forming a dynamic wireless link without using previous infrastructure. In the MANETs any node can enter or leave a network at any time. Nodes can send or receive the data by using defined routing protocols and mobility models. Due to the unavailability of centralized system, MANETs are exposed to different network layer attacks. Worm Hole, Black Hole, Gray Hole, Byzantine and Sybil Attacks are some of the examples of network layer attacks, which destroys network topology resulting in data loss and network degradation. In the Black Hole Attack, a node proclaims itself as having closest paths to all the destinations. This node absorbs all the data packets of network by exploiting the routing protocol thus degrading network performance. In this Paper, we have discussed different techniques that can be used to detect and prevent MANETs from black hole attacks.
KW - AODV protocol
KW - Black hole
KW - MANET
KW - Security attacks
UR - http://www.scopus.com/inward/record.url?scp=85050475637&partnerID=8YFLogxK
U2 - 10.1109/ISWSN.2017.8250039
DO - 10.1109/ISWSN.2017.8250039
M3 - Conference article published in proceeding or book
AN - SCOPUS:85050475637
T3 - 2017 International Symposium on Wireless Systems and Networks, ISWSN 2017
SP - 1
EP - 4
BT - 2017 International Symposium on Wireless Systems and Networks, ISWSN 2017
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 19 November 2017 through 22 November 2017
ER -