Online Submission!

Open Journal Systems


S. Janani, N. Kumaratharan, D. Balasubramanian


Mobile Ad hoc Networks (MANETs) rely on the cooperation of nodes for packet routing and forwarding. MANETs are a kind of Wireless ad hoc network that usually has a routable networking environment on top of a Link Layer ad hoc network. MANETs consist of a peer-to-peer, self-forming, self-healing network. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this context, preventing or detecting malicious nodes launching gray hole or collaborative black hole attacks is a challenge. To overcome the malevolent nodes issues, the DSR algorithm is implemented. DSR involves two main processes: route discovery and route maintenance. To execute these routes, the source node broadcasts a Route Request (RREQ) packet and the destination node broadcasts a Route Reply (RREP) packet through the network. In proposed system a mechanism called cooperative bait detection scheme (CBDS) is introduced to detect and avoid black hole  attack in order to improve the efficiency  of the MANETS relying with the Packet Delivery Ratio - achieved using setting of  threshold value  , End-to-End delay - achieved when PDR is maximum  - and throughput.

Full Text:



Chang.C, Wang.Y, and Chao.H (2007.), “An efficient Mesh-based core multicast routing protocol on MANETs,”J. Internet Technol., vol. 8, , pp. 229–239.

Corson and Macker.J, RFC 2501 (2013), Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, (Last retrieved March 18,). [Online].

Deng.H, Li.W, and Agrawal.D (2002.), “Routing security in wireless ad hoc network,”IEEE Commun. Mag., vol. 40.

Johnson.D and Maltz.D (1996), “Dynamic source routing in ad hoc wireless networks,”Mobile Comput., pp. 153–181.

Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai (2015) ,” Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative BaitDetection Approach” IEEE systems journal, vol 9.

Liu.K, Pramod.D, Varshney.K, and Balakrishnan.K (2007), “An Acknowledgement based approach for the detection of routing misbehavior in MANETs,”IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550.

Ramaswamy.S, Fu.H, Sreekantaradhya.M, Dixon.J, and Nygard.K (2003), “Prevention of cooperative blackhole attacks in wireless ad hoc networks,” inProc. Int. Conf. Wireless Netw., pp. 570–575.

Rubin, Behzad.A, Zhang.R, Luo.H, and Caballero.E (2002), “TBONE: A mobile-backbone protocol for ad hoc wireless networks,” inProc. IEEE Aerosp. Conf., vol. 6, pp. 2727–2740.

Tsou.P-.C, Chang.J.-M, Chao.H.-C, and ChenJ.-L(2011), “CBDS: A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture,” inProc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, pp. 1–5.

Wang.W, Bhargava.B, and Linderman.M (2009), “Defending against collaborative packet drop attacks on MANETs,” inProc.28 IEEE Int. Symp.Reliable Distrib. Syst., New Delhi, India.

Weerasinghe.H and Fu.H (2007), “Preventing cooperative blackhole attacks in mobile ad hoc networks: Simulation implementation and evaluation,” in Proc. IEEE ICC pp. 362–367.



  • There are currently no refbacks.

Copyright (c) 2016 An International Journal of Advanced Computer & Engineering Technology