Performance Evaluation of Routing Protocol Under Black Hole Attack in Manet and Suggested Security Enhancement Mechanisms
Swapnil S. Bhalsagar1, Manish D. Chawhan2, Yogesh Suryawanshi3, V. K. Taksande4

1Swapnil Sunilrao Bhalsagar, M.Tech. Student, Department of Communication Engineering, Electronics and Telecommunication Engineering, Yeshwantrao Chavan College of Engineering, Nagpur (Maharashtra), India.
2Manish D. Chawhan, Associate Professor, Department of Electronics & Telecommunication Engineering, Yashwantrao Chavan College of Engineering, Nagpur University (Maharashtra), India.
3Yogesh Suryawanshi, Assistant Professor, Department of Electronics Engineering, Yashwantrao Chavan College of Engineering, Nagpur University, (Maharashtra), India.
4V. K. Taksande, Department of Electronics & Engineering Tele Communication, Priyadarshini College of Engineering, Nagpur University, (Maharashtra), India.
Manuscript received on 07 March 2019 | Revised Manuscript received on 20 March 2019 | Manuscript published on 30 March 2019 | PP: 879-884 | Volume-8 Issue-5, March 2019 | Retrieval Number: E3214038519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The Mobile Ad-hoc network (MANET) is the most widely used type among all Wireless Ad-hoc networks where the number of moving nodes connecting to each other is not fixed. There is no central management system in MANET. Protocols are designed as per the node handling capacity in proper way by using multi-hop network topology. Sometimes the protocols fail to communicate due to the presence of an external attacking (malicious) node such as Black hole (BH), Gray hole (GH), etc.. This may cause a great loss of valuable data. Therefore, routing security is a major concern now a days. To properly secure routing, changes has to be made in the routing protocols continuously. In this paper, an overview of some conventional protocols such as AODV, DSDV and DSR protocols is given. Different types of malicious attacks such as Black hole, Gray hole, Jellyfish and Wormhole Attack are studied. In this paper, how trust based scheme will help in overcoming the adverse effects due to the presence of malicious nodes is given. The trust based schemes are introduced in a protocol in order to avoid addition of a malicious node in the route by assigning it a trust value. Also a comparative analysis has been done between the preventive Trust Based Protocols that ensure high security and minimize the effects of these malicious attacks. The DSR protocol under Black hole attack is implemented and the performance is analysed with respect to Packet Delivery Ratio, Throughput, Number of Received Packets and Average End-toend Delay. The improvement in these factors of a protocol will make it more secure and reliable. Thus, it will be applicable to be employed in the fields where security is of utmost importance.
Keyword: MANET, AODV, Routing Attack, ESCT, TDSR.
Scope of the Article: Network Protocols & Wireless Networks