Fig. 1. A black hole attack based on forged route reply packet.
Fig. 2. Roadmap of this survey.
Fig. 3. The four fields of pending packet table in [45].
Fig. 4. The four fields of node rating table in [45].
Table 1. Taxonomy of references in this survey
Table 2. The detection schemes for non-cooperative black hole attack in MANET
Table 2. (Continued)
Table 3. The detection schemes for collaborative black hole attack in MANET
References
- J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, TX, 1998, pp. 85-97.
- A. Nadeem and M. P. Howarth, "A Survey of MANET intrusion detection & prevention approaches for network layer attacks," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2027-2045, 2013. https://doi.org/10.1109/SURV.2013.030713.00201
- F. H. Tseng, L. D. Chou, and H. C. Chao, "A survey of black hole attacks in wireless mobile ad hoc networks," Human-centric Computing and Information Sciences, vol. 1, article no. 4, 2011.
- E. M. Royer and C. K. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications, vol. 6, no. 2, pp. 46-55, 1999. https://doi.org/10.1109/98.760423
- C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), New Orleans, LA, 1999, pp. 90- 100.
- D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Computing, vol. 353, pp. 153-181, 1996.
- C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in Proceedings of Conference on Communications Architectures (SIGCOMM '94), Protocols and Applications, London, UK, 1994, pp. 234-244.
- P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot, "Optimized link state routing protocol for ad hoc networks," in Proceedings of the IEEE International Multi Topic Conference (INMIC): Technology for the 21st Century, 2001, pp. 62-68.
- V. Park and S. Corson, "Temporally-ordered routing algorithm (TORA) version 1: functional specification," The Internet Engineering Task Force, Fremont, CA, Internet Draft, 1997.
- Z. J. Haas, M. R. Pearlman, and P. Samar, "The zone routing protocol (ZRP) for ad hoc networks," The Internet Engineering Task Force, Fremont, CA, Internet Draft, 2002.
- R. Lakhwani, S. Suhane, and A. Motwani, "Agent based AODV protocol to detect and remove black hole attacks," International Journal of Computer Applications, vol. 59, no. 8, pp. 35-39, 2012.
- N. Sharma and A. Sharma, "The black-hole node attack in MANET," in Proceedings of 2nd International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2012, pp. 546-550.
- M. Al-Shurman, S. M. Yoo, and S. Park, "Black hole attack in mobile ad hoc networks," in Proceedings of the 42nd Annual ACM Southeast Regional Conference, Huntsville, AL, 2004, pp. 96-97.
- N. R. Yerneni and A. K. Sarje, "Secure AODV protocol to mitigate black hole attack in mobile ad hoc," in Proceedings of 3rd International Conference on Computing Communication & Networking Technologies (ICCCNT), Coimbatore, India, 2012, pp. 1-5.
- F. Thachil and K. C. Shet, "A trust based approach for AODV protocol to mitigate black hole attack in MANET," in Proceedings of International Conference on Computing Sciences, Phagwara, India, 2012, pp. 281-285.
- R. K. Bar, J. K. Mandal, and M. M. Singh, "QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack," Procedia Technology, vol. 10, pp. 530-537, 2013. https://doi.org/10.1016/j.protcy.2013.12.336
- S. Biswas, T. Nag, and S. Neogy, "Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET," in Proceeding of Applications and Innovations in Mobile Computing (AIMoC), Kolkata, India, 2014, pp. 157-164.
- A. Sharma, R. Singh, and G. Pandey, "Detection and prevention from black hole attack in AODV protocol for MANET," International Journal of Computer Applications, vol. 50, no. 5, pp. 1-4, 2012. https://doi.org/10.5120/7764-0837
- P. K. Singh and G. Sharma, "An efficient prevention of black hole problem in AODV routing protocol in MANET," in Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 2012, pp. 902-906.
- K. Vishnu and A. J. Paul, "Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks," International Journal of Computer Applications, vol. 1, no. 22, pp. 38-42, 2010.
- P. Jaiswal and R. Kumar, "Prevention of black hole attack in MANET," International Journal of Computer Networks and Wireless Communications, vol. 2, no. 5, pp. 599-606, 2012.
- N. Mistry, D. C. Jinwala, and M. Zaveri, "Improving AODV protocol against blackhole attacks," in Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, pp. 1034-1039, 2010.
- L. Tamilselvan and V. Sankaranarayanan, "Prevention of blackhole attack in MANET," in Proceedings of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), Sydney, Australia, 2007, pp. 21-21.
- K. S. Sujatha, V. Dharmar, and R. S. Bhuvaneswaran, "Design of genetic algorithm based IDS for MANET," in Proceedings of International Conference on Recent Trends in Information Technology, Chennai, India, 2012, pp. 28-33.
- R. Kumar and R. Chadha, "Mitigation of black hole attack using generic algorithms and fuzzy logic," International Journal of Engineering Sciences & Research Technology, vol. 5, no. 6, pp. 818-826, 2016.
- Sonia and H. Kaur, "Proficient and enhance the mobile ad-hoc network using routing protocol and EBFOA (Enhanced Bacteria Foraging Optimization Algorithm)," International Journal of Modern Computer Science, vol. 4, no. 6, pp. 88-94, 2016.
- K. M. Passino, "Biomimicry of bacterial foraging for distributed optimization and control," IEEE Control Systems, vol. 22, no. 3, pp. 52-67, 2002. https://doi.org/10.1109/MCS.2002.1004010
- K. S. Sowmya, T. Rakesh, and D. P. Hudedagaddi, "Detection and prevention of blackhole attack in MANET using ACO," International Journal of Computer Science and Network Security, vol. 12, no. 5, pp. 21-24, 2012.
- D. G. Kariya, A. B. Kathole, and S. R. Heda, "Detecting black and gray hole attacks in mobile ad hoc network using an adaptive method," International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 1, pp. 37-41, 2012.
- I. Woungang, S. K. Dhurandher, M. S. Obaidat, and R. D. Peddi, "A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks," Security and Communication Networks, vol. 9, no. 5, pp. 420-428, 2016. https://doi.org/10.1002/sec.766
- M. Mohanapriya and I. Krishnamurthi, "Modified DSR protocol for detection and removal of selective black hole attack in MANET," Computers and Electrical Engineering, vol. 40, no. 2, pp. 530-538, 2014. https://doi.org/10.1016/j.compeleceng.2013.06.001
- S. Kumar and K. Dutta, "Intrusion detection technique for black hole attack in mobile ad hoc networks," International Journal of Information Privacy, Security and Integrity, vol. 2, no. 2, pp. 81-101, 2015. https://doi.org/10.1504/IJIPSI.2015.075435
- M. Patel and S. Sharma, "Detection of malicious attack in MANET a behavioral approach," in Proceeding of 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 2013, pp. 388-393.
- S. Tan and K. Kim, "Secure route discovery for preventing black hole attacks on AODV-based MANETs," in Proceedings of International Conference on ICT Convergence (ICTC), Jeju, Korea, 2013, pp. 1027-1032.
- U. Ghosh and R. Datta, "SDRP: secure and dynamic routing protocol for mobile ad-hoc networks," IET Networks, vol. 3, no. 3, pp. 235-243, 2014. https://doi.org/10.1049/iet-net.2013.0056
- T. Varshney, T. Sharma, and P. Sharma, "Implementation of watchdog protocol with AODV in mobile ad hoc network," in Proceeding of 4th International Conference on Communication Systems and Network Technologies, Bhopal, India, 2014, pp. 217-221.
- S. Shahabi, M. Ghazvini, and M. Bakhtiarian, "A modified algorithm to improve security and performance of AODV protocol against black hole attack," Wireless Networks, vol. 22, no. 5, pp. 1505-1511, 2016. https://doi.org/10.1007/s11276-015-1032-y
- A. Siddiqua, K. Sridevi, and A. A. K. Mohammed, "Preventing black hole attacks in MANETs using secure knowledge algorithm," in Proceedings of International Conference on Signal Processing and Communication Engineering Systems, Guntur, India, 2015, pp. 421-425.
- A. M. Fahad and R. C. Muniyandi, "Harmony search algorithm to prevent malicious nodes in mobile ad hoc networks (MANETs)," Information Technology Journal, vol. 15, no. 3, pp.84-90, 2016. https://doi.org/10.3923/itj.2016.84.90
- J. M. Chang, P. C. Tsou, I. Woungang, H. C. Chao, and C. F. Lai, "Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach," IEEE Systems Journal, vol. 9, no. 1, pp. 65-75, 2015. https://doi.org/10.1109/JSYST.2013.2296197
- M. B. M. Kamel, I. Alameri, and A. N. Onaizah, "STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET," in Proceedings of IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 2017, pp. 1278-1282.
- R. Das, B. S. Purkayastha, and P. Das, "Security measures for black hole attack in MANET: an approach," International Journal of Engineering Science and Technology, vol. 3, no. 4, pp. 2832-2838, 2011.
- S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of cooperative black hole attack in wireless ad hoc networks," in Proceedings of the International Conference on Wireless Networks, Las Vegas, NV, 2003, pp. 570-575.
- H. Weerasinghe and H. Fu, "Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation," in Proceedings of Future Generation Communication and Networking (FGCN 2007), Jeju, Korea, 2007, pp. 362-367.
- A. A. Bhosle, T. P. Thosar, and S. Mehatre, "Black-hole and wormhole attack in routing protocol AODV in MANET," International Journal of Computer Science, Engineering and Applications (IJCSEA), vol. 2, no. 1, pp. 45-54, 2012. https://doi.org/10.5121/ijcsea.2012.2105
- I. Woungang, S. K. Dhurandher, R. D. Peddi, and I. Traore, "Mitigating collaborative blackhole attacks on DSR-based mobile ad hoc networks," in Proceedings of the International Symposium on Foundations and Practice of Security, Montreal, Canada, 2012, pp. 308-323.
- J. M. Chang, P. C. Tsou, H. C. Chao, and J. L. Chen, "CBDS: a cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture," in Proceedings of 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), Chennai, India, 2011, pp. 1-5.
- P. C. Tsou, J. M. Chang, Y. H. Lin, H. C. Chao, and J. L. Chen, "Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs," in Proceedings of 13th International Conference on Advanced Communication Technology (ICACT2011), Seoul, Korea, 2011, pp. 755-760.
- K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536-550, 2007. https://doi.org/10.1109/TMC.2007.1036
- Y. Xue and K. Nahrstedt, "Providing fault-tolerant ad hoc routing service in adversarial environments," Wireless Personal Communications, vol. 29, no. 3-4, pp. 367-388, 2004. https://doi.org/10.1023/B:WIRE.0000047071.75971.cd
- G. S. Bindra, A. Kapoor, A. Narang, and A. Agrawal, "Detection and removal of co-operative blackhole and grayhole attacks in MANETs," in Proceedings of International Conference on System Engineering and Technology (ICSET), Bandung, Indonesia, 2012, pp. 1-5.
- A. Mishra, R. Jaiswal, and S. Sharma, "A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network," in Proceedings of 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 2013, pp. 499-504.
- S. K. Dhurandher, I. Woungang, R. Mathur, and P. Khurana, "GAODV: a modified AODV against single and collaborative black hole attacks in MANETs," in Proceedings of 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 2013, pp. 357-362.
- A. A. Aware and K. Bhandari, "Prevention of black hole attack on AODV in MANET using hash function," in Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, 2014, pp. 1-6.
- R. J. Cai, X. J. Li, and P. H. J. Chong, "A novel self-checking ad hoc routing scheme against active black hole attacks," Security and Communication Networks, vol. 9 no. 10, pp. 943-957, 2016. https://doi.org/10.1002/sec.1390
- N. Arya, U. Singh, and S. Singh, "Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm," in Proceedings of International Conference on Computer, Communication and Control (IC4), Indore, India, 2015, pp. 1-5.
- K. S. Arathy and C. N. Sminesh, "A novel approach for detection of single and collaborative black hole attacks in MANET," Procedia Technology, vol. 25, pp. 264-271, 2016. https://doi.org/10.1016/j.protcy.2016.08.106
- M. Sathish, K. Arumugam K, S. N. Pari, and V. S. Harikrishnan, "Detection of single and collaborative black hole attack in MANET," in Proceedings of International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016, pp. 2040-2044.
- B. Cerda, E. Martinez-Belmares, and S. Yuan, "Protection from black hole attacks in communication networks," in Proceedings of the International Conference on Security and Management, Las Vegas, NV, 2017, pp. 7-11.
- S. Sharma and S. Gambhir, "CRCMD&R: cluster and reputation based cooperative malicious node detection & removal scheme in MANETs," in Proceedings of 11th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 2017, pp. 336-340.
- C. W. Tsai, "Incremental particle swarm optimisation for intrusion detection," IET Networks, vol. 2, no. 3, pp. 124-130, 2013. https://doi.org/10.1049/iet-net.2012.0209
- A. Mitrokotsa and C. Dimitrakakis, "Intrusion detection in MANET using classification algorithms: the effects of cost and model selection," Ad Hoc Networks, vol. 11, no. 1, pp. 226-237, 2013. https://doi.org/10.1016/j.adhoc.2012.05.006
- J. S. Park, D. H. Choi, Y. B. Jeon, Y. Nam, M. Hong, and D. S. Park, "Network anomaly detection based on probabilistic analysis," Soft Computing, 2017. https://doi.org/10.1007/s00500-017-2679-3
- R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, "DoS attacks in mobile ad hoc networks: a survey," in Proceedings of 2nd International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2012, pp. 535-541.
- P. Sharma, N. Sharma, and R. Singh, "A secure intrusion detection system against DDOS attack in wireless mobile ad-hoc network," International Journal of Computer Applications, vol. 41, no. 21, pp. 16-21, 2012. https://doi.org/10.5120/5824-8064
- E. M. Shakshuki, N. Kang, and T. R. Sheltami, "EAACK-a secure intrusion-detection system for MANETs," IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1089-1098, 2013. https://doi.org/10.1109/TIE.2012.2196010
- N. Kang, E. Shakshuki, and T. Sheltami, "Detecting misbehaving nodes in MANETs," in Proceedings of the 12th International Conference on Information Integration and Web-Based Applications & Services, Paris, France, 2010, pp. 216-222.
- F. Shi, W. Liu, D. Jin, and J. Song, "A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology," Electronic Commerce Research, vol. 13, no. 3, pp. 329-345, 2013. https://doi.org/10.1007/s10660-013-9122-3
- J. Yu, H. Kang, D. H. Park, H. C. Bang, and D. W. Kang, "An in-depth analysis on traffic flooding attacks detection and system using data mining techniques," Journal of Systems Architecture, vol. 59, no. 10, pp. 1005-1012, 2013. https://doi.org/10.1016/j.sysarc.2013.08.008
- F. C. Jiang, C. H. Lin, and H. W. Wu, "Lifetime elongation of ad hoc networks under flooding attack using power-saving technique," Ad Hoc Networks, vol. 21, pp. 84-96, 2014. https://doi.org/10.1016/j.adhoc.2014.05.002
- R. J. Hwang and Y. K. Hsiao, "An anonymous distributed routing protocol in mobile ad-hoc networks," The Journal of Supercomputing, vol. 66, no. 2, pp. 888-906, 2013. https://doi.org/10.1007/s11227-013-0920-0
- S. Abbas, M. Merabti, D. Llewellyn-Jones, and K. Kifayat, "Lightweight Sybil attack detection in MANETs," IEEE Systems Journal, vol. 7, no. 2, pp. 236-248, 2013. https://doi.org/10.1109/JSYST.2012.2221912