Detecting and Eliminating Cooperative Black Hole Nodes Using EDRI Table in MANET

IJCSEC Front Page

MANET (Mobile Ad hoc Network) is having several nodes .They are configurable. The nodes which are in the network having mobility. Due to moving nature of the nodes in the network, the topology of the network is not stable. Security is a big challenge in the MANET. To transfer the data in the network, many protocols are used. As well as, many attacks may happen in the network, due to low security. Ad hoc On Demand Distance Vector (AODV) routing protocol is one of the protocol used for the data transfer which is also affected by the attacks in the network. In this paper, an approach known as EDRI table is used to eliminate the black hole nodes in the MANET.

Keywords: AODV, Attacks, Data packets ,Mobile ad hoc networks (MANET), Security


  1. Jaisankar, N., Saravanan, R., &DuraiSwamy, K. (2010), “A novel security approach for detecting black hole attack in MANET.” Information Processing and Management Communications in Computer and Information, Science, 70, 217–223.
  2. Nath, I., &Chaki, R. (2012),”BHAPSC: A new black hole attack prevention system in clustered MANET.” International Journal ofAdvanced Research in Computer Science and Software Engineering,2(8), 113–121.
  3. Surana, K. A., Rathi, S. B., Thosar, T. P., &Mehatre, S. (2012),”Securing black hole attack in routing protocol AODV in MANETwith watchdog mechanisms.” World Research Journal of ComputerArchitecture, 1(1), 19–23.
  4. Jain, S., Jain, M., &Kandwal, H. (2010),”Advanced algorithm fordetection and prevention of cooperative black and gray hole attacks in mobile ad hoc networks.” International Journal of Computer Applications, 1(7), 37–42.
  5. Rutvij, H. J., Sankita, J. P., &Devesh, C. J. (2012). “A novel approach for gray hole and black hole attacks in mobile ad hoc networks.” In Second international conference on advanced computing and communication technologies, IEEE.
  6. Sharma, D., Gajkumar Shah, P., & Huang, X. (2010). Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In NSS ‘10 proceedings of the fourth international conference on network and system security.
  7. Bindra, G. S., Kapoor, A., Narang, A., &Agrawal, A. (2012),”Detection and removal of cooperative black hole and gray hole attacks in MANETs”. In International conference on system engineering and technology, IEEE.
  8. Sen, J., Koilakonda, S., &Ukil, A. (2011).”A mechanism for detection of cooperative black hole attack in mobile ad hoc networks.” In Second international conference on intelligent systems, modeling and simulation (ISMS).
  9. Weerasinghe, H., & Fu, H. (2007),”Preventing cooperative blackhole attacks in mobile ad hoc networks: Simulation implementation and evaluation.” In Future generation communication andnetworking, FGCN (Vol. 2).
  10. Dorri, A., &Nikdel, H. (2015),”A new approach for detecting and eliminating cooperative black hole nodes in MANET.” In 7th conference on information and knowledge technology (IKT), (pp. 1–6). 26.
  11. Khan, Z. A., & Islam, M. H. (2012),”Wormhole attack: A new detection technique.” In International conference on emerging technologies (ICET).