EDRI based approach with BERP for Detection & Elimination of Co-operative Black Hole in MANET

Anchal Kalia, Harpreet Bajaj


Mobile Ad-Hoc Network (MANET) is a self-structured network that is formed automatically when mobile nodes come into range. There is no particular topology defined for MANET. Special attribute of MANET are changing topology, hop-by-hop communication and there is no defined boundary of these networks. These attributes make the security of the network highly challengeable. MANET are at high risk from different types of attack, Black hole Attack is one of them. In black hole attack, destructive node instills wrong routing information to the network. In this paper, a new technique is introduced to detect and mitigate Co-operative Black holeAttack in MANET by using AODV routing protocol. In this approach Extended Data Routing Information (EDRI) Table is used with Black Hole Elimination Routing Protocol (BERP). In this protocol a network region is divided into segments and then node status of each segment is checked separately to detect black hole. This means BERP will work better for co-operated blackhole nodes. Simulation results of the proposed work are better in throughput, latency and packet overhead 

Full Text:



Ali D.,HamedNikdel,(2016). “A New Approach for Detecting And Eliminating Cooperative Black Hole Node in MANET”. In 7th International Conference on Information and Knowledge Technology

Jaisankar, N., Saravanan, R., &DuraiSwamy, K. (2010). “A novel security approach for detecting black hole attack in MANET”. Information Processing and Management Communications in Computer and Information, Science, 70, 217–223

Nath, I., &Chaki, R. (2012). BHAPSC: “A new black hole attack prevention system in clustered MANET”. International Journal of Advanced Research in Computer Science and Software Engineering, 2(8), 113–121

Ali Dorri.,HamedNikdel,(2015). “A New Approach for Detecting And Eliminating Cooperative Black Hole Node in MANET”. In 7th International Conference on Information and Knowledge Technology.

Al-Karaki, J. N., & Kamal, A. E. (2004). “Routing techniques in wireless sensor networks: a survey”. Wireless communications, IEEE, 11(6), 6-28.

Ben Alla, S., Ezzati, A., BeniHssane, A., &Hasnaoui, M. L. (2011, April). “Hierarchical adaptive balanced energy efficient routing protocol (HABRP) for heterogeneous wireless sensor networks”. In Multimedia Computing and Systems (ICMCS), 2011 International Conference on (pp. 1-6). IEEE.

H. Weerasinghe , H. Fu,”preventing cooperative Black Hole attack in MANET”. (FGCN 2007)(Volume 2) .

Byers, J., & Nasser, G. (2000). “Utility-based decision-making in wireless sensor networks”. In Mobile and Ad Hoc Networking and Computing, 2000. MobiHOC. 2000 First Annual Workshop on (pp. 143-144). IEEE.

Closas, P., Zamora, A. P., & Rubio, J. A. F. (2009, April). “A game theoretical algorithm for joint power and topology control in distributed WSN” In Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on (pp. 2765-2768). IEEE.

Dai, H., & Han, R. (2003, December). “A node-centric load balancing algorithm for wireless sensor networks”. In Global Telecommunications Conference, 2003. GLOBECOM'03. IEEE (Vol. 1, pp. 548-552). IEEE.

Dufwenberg, M., &Kirchsteiger, G. (2004).“A theory of sequential reciprocity”. Games and economic behavior, 47(2), 268-298.

Han, Z. (2012). “Game theory in wireless and communication networks: theory, models, and applications”. Cambridge University Press.

Ishmanov, F., Malik, A. S., & Kim, S. W. (2011). Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview. European Transactions on Telecommunications, 22(4), 151-167.

Machado, R., &Tekinay, S. (2008). “A survey of game-theoretic approaches in wireless sensor networks”. Computer Networks, 52(16), 3047-3061.

MacKenzie, A. B., & DaSilva, L. A. (2006). “Game theory for wireless engineers”. Synthesis Lectures on Communications, 1(1), 1-86.

Meshkati, F., Poor, H. V., & Schwartz, S. C. (2007). “Energy-efficient resource allocation in wireless networks”. Signal Processing Magazine, IEEE, 24(3), 58-68.

Park, G. Y., Kim, H., Jeong, H. W., &Youn, H. Y. (2013, March). “A novel cluster head selection method based on K-means algorithm for energy efficient wireless sensor network”. In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on (pp. 910-915). IEEE.

Petrovic, D., Shah, R. C., Ramchandran, K., &Rabaey, J. (2003, May). “Data funneling: Routing with aggregation and compression for wireless sensor networks”. In Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE. 2003 IEEE International Workshop on (pp. 156-162). IEEE.

P.K. Singh and G. Sharma , “An Efficient prevention of black hole attack in AODV routing protocol in MANET.” ,IEEE,2012,pp.902-906

Sakarindr, P., & Ansari, N. (2007). “Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks”. Wireless Communications, IEEE, 14(5), 8-20.

Sarkar, S., &Datta, R. (2014, February). “A secure and energy-efficient stochastic routing protocol for wireless mobile ad-hoc networks”. In Communications (NCC), 2014 Twentieth National Conference on (pp. 1-6). IEEE.

Rutvij, H. J., Sankita, J. P., &Devesh, C. J. (2012). “A novel approach for grayole and black hole attacks in mobile ad hoc networks”. In Second international conference on advanced computing and communication technologies, IEEE.

Seada, K., Zuniga, M., Helmy, A., &Krishnamachari, B. (2004, November). “Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks”. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 108-121). ACM.

Shi, H. Y., Wang, W. L., Kwok, N. M., & Chen, S. Y. (2012). “Game theory for wireless sensor networks: a survey”. Sensors, 12(7), 9055-9097.

Ali Dorri(2016). “DEBH: Detection and Elimination Black Holes in Mobile Ad Hoc Network”.

Upadhyayula, S., & Gupta, S. K. (2007). “Spanning tree based algorithms for low latency and energy efficient data aggregation enhanced convergecast (dac) in wireless sensor networks”. Ad Hoc Networks, 5(5), 626-648.

Wagner, R., Sarvotham, S., Choi, H., &Baraniuk, R. (2005). “Distributed multiscale data analysis and processing for sensor networks”. RICE UNIV HOUSTON TX DEPT OF ELECTRICAL AND COMPUTER ENGINEERING.

Xu, J. Q., Wang, H. C., Lang, F. G., Wang, P., &Hou, Z. P. (2011, June). “Study on WSN topology division and lifetime”. In Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on (Vol. 1, pp. 380-384). IEEE.

Yadav, S., & Lakhani, K. (2013). “A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET”. International Journal of Distributed and Parallel Systems, 4(2), 17.


  • There are currently no refbacks.