Visible to the public A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network

TitleA review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Publication TypeConference Paper
Year of Publication2017
AuthorsGurung, S., Chauhan, S.
Conference Name2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
Date Publishedmar
KeywordsAODV, attack mitigation, black-hole attack mitigation techniques, Blackhole, byzantine attacks, clustering, compositionality, Conferences, cross checking, data packets, delays, destination nodes, high destination sequence number, IDS, MANET, Metrics, mobile ad hoc networks, mobile ad-hoc network, movables nodes, multihop communication, overhearing, Peer-to-peer computing, protocol, pubcrawl, resilience, Resiliency, Routing, Routing protocols, sequence number, source nodes, telecommunication security, telecommunication traffic, wireless networking field

Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless networking field in which the movables nodes operates in distributed manner and collaborates with each other in order to provide the multi-hop communication between the source and destination nodes. Generally, the main assumption considered in the MANET is that each node is trusted node. However, in the real scenario, there are some unreliable nodes which perform black hole attack in which the misbehaving nodes attract all the traffic towards itself by giving false information of having the minimum path towards the destination with a very high destination sequence number and drops all the data packets. In the paper, we have presented different categories for black hole attack mitigation techniques and also presented the summary of various techniques along with its drawbacks that need to be considered while designing an efficient protocol.

Citation Keygurung_review_2017