Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
1
3
,
No.
2
,
Febr
uar
y
201
9
, pp.
6
77
~
682
IS
S
N: 25
02
-
4752, DO
I: 10
.11
591/ijeecs
.v1
3
.i
2
.pp
6
77
-
682
677
Journ
al h
om
e
page
:
http:
//
ia
es
core.c
om/j
ourn
als/i
ndex.
ph
p/ij
eecs
Black h
ole
attack
behavio
ra
l
analy
sis gener
al netw
ork
scalabilit
y
Layth
A. Kh
al
il
A
l Dul
aimi
1
R.
Ba
dli
shah
Ah
m
ad
2
,
Nai
mah
Y
aakob
3
,
M
oh
d
H
af
iz
Y
us
off
4
,
Moham
ed El
s
ha
ikh
5
1,3,
5
Embedde
d
N
et
working
and
A
dvanc
e
Com
puting Cluste
r
,
Scho
ol
of
Com
pute
r
&
Com
m
unic
at
i
on
Engi
n
ee
ring
,
Univer
siti
Malays
ia
Perl
is (
UniMA
P) T
ingka
t
1,
Kam
p
us T
et
ap
Pauh,
Per
li
s,
Mal
a
y
sia
2,4
Facul
t
y
of
Inf
orm
at
ic
s a
nd
Co
m
puti
ng,
Univer
siti
Sult
an Za
in
a
l
Abidin
,
21300
Kuala
Te
r
engganu,
Mal
a
y
s
ia
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
S
ep
22
, 201
8
Re
vised
N
ov
1
0
, 2
018
Accepte
d
Nov
25
, 201
8
A
m
obil
e
ad
ho
c
net
work
(MA
NET)
is
a
f
rame
workless
s
y
stem
of
diffe
r
ent
m
obil
e
device
s
known
for
it
s
self
-
arr
ang
ing
con
duct
.
MA
NETs
ca
n
con
v
e
y
over
m
oder
atel
y
dat
a
tra
nsf
er
c
a
pac
i
t
y
compel
led
routi
ng
connect
ions.
In
a
bla
ckho
le
assaul
t,
a
m
al
i
ci
ous
no
de
f
al
sel
y
a
dver
t
ises
th
e
shor
te
st
pat
h
to
th
e
desti
nation
nod
e
,
in
te
nding
to
di
srupt
comm
unic
at
ion
.
Our
ob
jec
ti
ve
was
to
rev
ie
w t
he
impact
of
a
bl
ac
kho
le
assault
on
net
w
orks.
To
ac
comp
li
sh
thi
s,
we
sim
ula
te
d
MA
NET
situations,
w
hic
h
include
th
e
bl
ac
khol
e
node
,
using
the
OM
NET+
+
sim
ula
t
or
to
d
emons
tra
te
th
e
eff
ects
of
a
sing
le
bl
ackhole
atta
ck
and
m
ult
iple
bl
a
ckhol
e
attac
ks
o
n
MA
NET
per
f
orm
anc
e
hav
e
e
xamined
for
net
works
.
W
e
ana
l
y
sed
MA
NET
p
erf
orm
ance
unde
r
bl
ac
kh
ole
assault
s
through
th
e
use
of
per
form
ance grids.
Ke
yw
or
d
s
:
AOD
V
Bl
ackHole Att
ack
Mob
il
e a
d ho
c
netw
ork
(MA
NET)
Copyright
©
201
9
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Lay
th A.
Kh
al
i
l Al Dula
im
i,
School
of Com
pu
te
r
&
Com
m
un
ic
at
io
n
E
ngineeri
ng,
Un
i
ver
sit
i M
al
ay
sia
Per
li
s (U
niMAP
)
Ti
ngka
t 1,
Kam
pu
s Tetap
Pauh, Put
ra
02600 Ara
u, Pe
rlis.
Em
a
il
: Lay
th.a.khali
l@gm
ai
l.
com
1.
INTROD
U
CTION
The
The
wire
le
ss
net
work
is
an
in
novation
that
ena
bl
es
cl
ie
nts
t
o
acce
ss
se
rv
ic
e
s
an
d
data
el
ect
ro
nical
ly
,
regar
dless
of
their
e
nviro
nm
ental
po
sit
io
n.
T
he
m
ob
il
e
ad
hoc
netw
ork
(MA
NET
)
is
an
ind
e
pende
nt
w
irel
ess
netw
or
k
c
on
ta
ini
ng
a
utono
m
ou
s
no
des
that
tra
nsf
e
r
an
d
dynam
i
cal
ly
m
od
ify
ne
twork
connecti
vity
[
1,
2].
I
n
MA
NETs
,
no
des
are
al
lowe
d
t
o
m
ov
e
ra
ndom
ly
;
theref
ore,
t
he
ne
tw
ork’
s
wireless
topolo
gy
m
ay
change
quic
kly
an
d
unpre
dicta
bly.
MA
NET
s
era
dicat
e
the
r
est
raints
of
i
nfrastr
uctur
e
a
nd
al
lo
w
gadgets
t
o
m
ak
e
an
d
join n
et
works
a
nyw
he
re
a
nd
anyt
im
e
f
or
al
m
os
t
any
ap
plica
ti
on
sin
ce
an
ad
hoc
w
irel
ess
netw
ork
is
sel
f
c
onfig
ur
i
ng,
sel
f
or
gan
isi
ng
an
d
a
dap
ti
ve
[3,
4].
A
no
de
in
a
n
a
d
hoc
netw
ork
ca
n
be
the
destinat
io
n,
s
ource
or
inte
rm
e
diate
node
am
on
g
a
ny
destina
t
ion
a
nd
s
ource
[1,
5].
The
a
rb
i
trariness
of
s
pe
ci
al
l
y
appointe
d
port
abili
ty
with
no
set
tl
ed
f
ounda
ti
on
,
a
s
well
as
the
tra
ns
m
issio
n
nat
ur
e
of
w
irel
ess
cha
nnel
s
an
d
coope
rati
ve
m
ulti
-
hop
com
m
un
ic
at
io
ns
am
on
g
m
ob
il
e
node
s
of
m
ob
il
e
ad
hoc
netw
orks,
increase
s
wea
knesse
s
[6,
7].
Pe
netrat
ion
s
ca
n
be
cl
a
ssifie
d
as
pa
ssive
or
act
ive
ba
sed
on
at
ta
cke
r
beh
a
viour
.
Pas
sive
pe
netrati
on
is
in
acqu
i
rin
g
si
gnific
ant
in
f
or
m
at
ion
re
gardle
ss
of
cutti
ng
the
routin
g
process
by
sp
yi
ng
on
tra
ff
ic
.
Acti
ve
pen
et
rati
on
is
a
m
or
e
s
eri
ous
a
tt
ack,
as
it
at
te
m
pts
to
gain
il
le
gitim
at
e
acce
ss
to
the
net
wor
k
by
i
ntersecti
ng
t
he
routin
g
proce
ss
to
reduce
netw
ork
pe
rfo
rm
ance.
Exam
ples
of
possible
act
iv
e
secur
it
y
pe
ne
trat
ion
s
in
M
A
NETs
include
r
ushin
g
at
ta
cks
,
w
or
m
ho
le
threats
a
nd
blac
khole
at
ta
cks
[
8,
9].
A
By
zanti
ne
at
ta
ck
[
10]
inclu
de
s
at
ta
cks
on
r
outi
ng
ta
bl
e
acce
ss,
as w
e
ll
as
poiso
ning r
oute
cac
hes,
gray
hole
at
ta
ck
s
[
11
-
13
]
a
nd
t
he
distrib
uted
d
enial
of
se
r
vice
thre
at
s
[14,
15]
.
Bl
ackhole
assa
ult
is
a
serio
us
se
cur
it
y
assault
a
s
it
at
t
e
m
pts
to
red
i
rect
the
fl
ow
of
inf
or
m
at
ion
away
f
ro
m
the
pro
po
se
d
desti
nation,
as
an
a
ggressi
ve
node
act
s
to
posses
s
the
id
eal
pat
h
to
the
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
1
3
, N
o.
2
,
Fe
bru
ary
201
9
:
6
77
–
682
678
destinat
io
n
node
a
nd
a
dap
ts
den
ia
l
-
of
-
se
rv
i
ce
be
ha
viour
by
kill
in
g
data
pac
kets
[16,
12
]
or
f
orwa
rds
data
pack
et
s
to u
ndesi
red
destinat
i
on
s
[1
6,
11, 1
7]
.
The
m
ai
n
obje
ct
ive
of
this
pa
pe
r
is
to
aud
it
t
he
im
p
act
of
black
hole
assa
ults
on
netw
orks
.
To
acc
om
plish
this,
we
sim
ulate
d
MAN
ET
sc
enar
i
os
,
incl
ude
black
ho
le
nodes,
us
in
g
the
OMNET
++
sim
ula
tor
[3
]
.
T
o
sim
ulate
the
blac
k
hol
e
node
in
M
A
NETs
,
we
sim
ulate
d
a
blac
khole
at
ta
ck
as
s
ault
to
dem
on
s
trat
e
it
s
pro
per
ti
es.
We
then
a
ssesse
d
t
he
im
pact o
f
a
black
ho
le
assa
ult o
n
M
AN
E
T
.
The
m
ai
n
co
ntributi
on
s
of
t
his
pap
e
r
are
to
dem
on
strat
e
t
he
im
pact
of
si
ngle
black
hole
assault
s
a
nd
m
ul
ti
ple
black
ho
le
assa
ults
on
M
ANET
pe
r
form
ance.
W
e
exam
ined
net
works
with
10
di
ver
se
nu
m
ber
s
of
nodes
.
2.
BL
AC
K
HOL
E ATTA
CK
On
e
of
t
he
m
os
t
crit
ic
al
at
ta
c
ks
on
MA
NET
s
that
af
fects
ne
twork
secu
rity
is
a
blac
khol
e
at
ta
ck.
T
he
cl
assifi
cat
ion
of
a
blac
khole
a
tt
a
ck
is
based
on
w
hethe
r
an
at
ta
ck
is
si
m
pl
e
or
c
oope
rati
ve
.
N
or
m
al
ly
a
si
m
ple
or
ordi
nar
y
blackhole
at
ta
ck
li
kely
occ
ur
s
in
MANET
s
w
he
n
a
bad
-
inte
ntion
e
d
node
(m
a
li
ci
ou
s
no
de)
tam
pers
with
t
he
pac
ket
stream
[9
]
an
d
ex
plo
it
s
r
outi
ng pro
t
oco
l
to
a
ns
we
r
the
re
qu
est
f
ro
m
sourc
e
no
de
RR
EQ
w
it
h
a
fak
e
re
ply
pac
ke
t
RR
EP
pret
e
nd
i
ng
to
own
t
he
ideal
pat
h
to
the
goal
no
de
su
pp
or
te
d
by
hi
gh
est
se
quen
c
e
valu
e
as
evide
nce
th
e
highest
se
quence
val
ue
as
evide
nce
[
19]
.
Con
se
quently
,
a
bad
-
inte
ntio
ned
node
(
blackhole
node
)
b
loc
ks
da
ta
pac
kets
f
r
om
being
delive
red
to
t
he
goal
node
or
from
even
bei
ng
f
orw
ard
e
d
t
o
neig
hbou
rin
g
nodes
[20
]
.
Fig
ur
e
1 de
picts si
m
ple b
la
ckhole b
e
hav
i
our.
Figure
1.
Sim
ple b
la
ck h
ole at
ta
ck
On
the
oth
e
r
ha
nd,
in
a
co
op
erati
ve
black
hole
at
ta
ck,
a
gr
oup
of
no
des
—
at
le
ast
two
adjoini
ng
ba
d
-
intenti
oned
nodes
—
a
ggressi
ve
ly
colla
bo
rate
to
stop
data
pa
ckets
from
reaching
their
le
gitim
at
e
destinat
ion
.
This
at
ta
ck
is
m
or
e
threateni
ng
t
han
a
sim
pl
e
blac
khole
at
t
ack
due
to
t
he
e
ffor
tl
ess
natur
e
of
t
he
at
ta
ck
e
xecu
ti
on
and
t
he
dif
ficul
ty
fo
r
oth
er
pa
r
ti
ci
pating
node
s
in
the
net
wor
k
to
re
veal
this
at
ta
ck
[6
]
.
A
c
oope
rati
ve
at
ta
ck
is
accom
plished
w
he
n
a b
la
ck
hole
-
inte
ntion
e
d
no
de
is
the
fi
r
st
am
on
g
ot
her
nei
ghbours
of the
s
ource
no
de
.
T
his
node
receive
s
a
RR
EQ
pac
ket
from
the
sourc
e
node
to
an
sw
er
with
a
fa
ke
RR
EP
pac
ket
offe
rin
g
the
best
r
ou
t
e
to
the
destinat
i
on.
C
on
se
quen
tl
y,
the
sou
rce
node
be
gin
s
to
pu
s
h
data
t
o
th
e
black
hole
-
int
entione
d
no
de,
wh
i
c
h
in
tu
r
n
pas
ses
da
ta
pack
et
s
to
t
he
ne
xt
blac
khole
te
a
m
m
a
te
t
hat
ei
ther
im
pr
isons
the
data
pa
ckets
or
pa
rtic
ipate
s
with
t
he
blac
khole
te
am
m
a
te
to
swall
ow
the
data
rathe
r
t
han
pa
ss
it
to
the
le
gitim
at
e
destin
at
ion
.
Fi
gure
2
sh
ows
a
sim
ple
coope
rati
ve
black
hole
at
ta
ck
in
w
hi
ch
S
a
nd
D
de
note
s
ource
no
de
an
d
de
sti
nation
node
se
qu
e
ntial
ly
,
wh
il
e B
1
a
nd
B2
denote c
ooper
at
ive
b
la
c
khole att
ack
node
s.
Ba
sed
on
the
abili
ty
of
sim
ple
and
cooper
at
ive
black
ho
le
at
ta
ckin
g
nodes
to
ta
m
per
ro
uti
ng
inf
or
m
at
ion
,
it
is
obvious
t
ha
t
black
ho
le
at
t
acks
im
pact
network
la
ye
rs
[
21
]
a
nd
t
his
is
consi
de
red
a
so
rt
of
den
ia
l
-
of
-
se
rv
i
ce
th
reat
t
hat
dam
ages
tra
ns
m
issi
on
of
the
ne
twork
la
ye
r
[
22
]
.
S
uccess
ful
schem
es
ha
ve
be
e
n
su
ggest
e
d
in
a
n
at
tem
pt
to
rev
eal
an
d
bl
oc
k
sim
ple
blackh
ole
th
reats.
Howe
ver,
the
eff
ic
ie
nt
detect
ion
of
coope
rati
ve
bl
ackhole
at
ta
c
ks
is
sti
ll
unfeas
ible
to
sc
hem
e
s
use
d
f
or
dete
ct
ing
sim
ple
blackhole
at
ta
c
ks,
a
nd
this
m
otivate
s
research
e
rs
t
o
s
uggest
m
or
e
sc
hem
es
to
ta
rg
et
su
c
h
at
ta
cks
.
It
is
w
or
t
h
m
entio
ni
ng
that
blac
khol
e
at
ta
cks
no
t
onl
y
pose
a
t
hr
eat
to
c
omm
un
ic
a
ti
on
secu
rity
in
MA
NETs
bu
t
al
so
to
ve
hicu
la
r
a
d
hoc
net
works
(VANET)
[2
7] an
d wirele
ss
m
esh
net
works
(W
M
Ns
)
[
28]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Black
ho
le
atta
ck be
ha
vi
oral
analysis
gen
e
r
al n
et
w
or
k sc
al
ab
il
it
y
(
La
yt
h
A. Khali
l Al
Dulaimi
)
679
Figure
2
.
Co
operati
ve blac
khol
e att
ack
3.
INV
E
STIG
A
TING BL
ACKHOLE
AS
S
AU
LT
S
IN A
ODV P
ROTO
COLS
The
im
ple
m
ent
at
ion
of
the
bla
ckhole
at
ta
ck
i
s
at
tem
pted
on
the
ad
hoc
net
work.
T
o
be
sure
the
e
xecu
ti
on
worked
ef
fecti
vely
,
we
use
d
OMNET
++,
one
of
the
m
os
t
com
m
on
sim
u
la
ti
on
to
ols
in
the
net
wor
king
fiel
d.
Additi
on
al
ly
,
the
NET
Atta
ck
f
ram
ewo
rk
is
base
d
on
the
sam
e
idea
as
OMNET
+
+
[23].
To
te
st
the
i
m
ple
m
entat
io
n,
we
perf
or
m
ed
t
hr
ee
sim
ulati
on
s.
I
n
the
f
irst
one,
we
di
d
not
us
e
any
black
ho
le
node
.
In
the
seco
nd
one,
w
e
ad
ded
a
si
ngle
black
ho
le
at
ta
ck.
In
the
t
hird
one,
we
ad
ded
a
c
oope
rati
ve
blac
khole
a
tt
ac
k
nodes
. We c
om
par
ed
the
outc
om
es o
f
the
si
m
ula
ti
on
s.
Si
m
ulati
on
para
m
et
ers
and m
easur
e
d
m
et
rics.
We
util
ise
d
the
fo
ll
owin
g
m
et
rics in
our re
view:
1)
Packet
delive
r
y
rati
o
(PDR):
cal
culat
ed
by
di
vid
in
g
t
he
nu
m
ber
of
pac
kets
recei
ve
d
by
t
he
destinat
io
n
by
the num
ber
of
pack
et
s
origi
na
te
d
f
ro
m
the s
ource;
2)
Av
e
ra
ge
th
rou
ghput:
the a
verage
of su
cce
ssf
ul m
essage d
el
ivery
ov
e
r
a c
om
m
un
ic
at
ion
c
hannel;
and
3)
Av
e
ra
ge
e
nd
-
to
-
e
nd
delay
:
de
fine
d
a
s
t
he
ti
m
e
ta
ken
for
a
data
pac
ket
t
o
be
tran
sm
i
tt
ed
acro
s
s
M
ANE
Ts
from
so
ur
ce
to desti
natio
n [18
]
.
To
ta
ke
ex
act
outc
om
es f
ro
m
the sim
ulati
on
s the co
m
m
on
param
et
ers
to all
sit
uations
(
sc
enar
i
os
)
a
re
repor
te
d
in
the
Table
1.
Table
1.
Sim
ul
at
ion
s
Param
eter
s
Para
m
eter
Valu
e
Nu
m
b
e
r
o
f
M
o
b
ile
Nod
es
2
0
,
4
0
,
6
0
,
8
0
and
1
0
0
Si
m
u
latio
n
ar
ea
1
0
0
0
m
x 1
0
0
0
m
Co
m
m
u
n
icatio
n
r
a
n
g
e
2
5
0
m
Si
m
u
latio
n
ti
m
e
600s
Si
m
u
latio
n
r
u
n
s
50
Gen
erate
d
n
et
wo
r
k
s
10
Ro
u
tin
g
pro
t
o
co
l
AODV
MAC la
y
e
r
p
roto
c
o
ls
8
0
2
.11g
Nu
m
b
e
r
o
f
attacke
rs
1
,5
Co
n
stan
t Bitrate
(
CB
R) con
n
ectio
n
4
pack
ets/s
Pack
et
size
5
1
2
bytes
Mov
e
m
en
ts rand
o
m
l
y
start between
0.5
a
n
d
1.5
s and
they
e
n
d
a
m
o
n
g
st 2
9
0
and
29
5
s
Sp
eed
1
m
/s an
d
the
m
ax
i
m
u
m
dif
f
ers fro
m
5
to 2
0
m
/s
with a
p
au
se ti
m
e of
15
s
4.
PPR
AISAL O
F R
ES
ULTS
The
(3)
div
e
rs
e
sim
ulatio
ns
wer
e
te
ste
d.
I
n
the
on
e
,
the
node
s
worke
d
in
c
ollabora
ti
on
am
ong
them
sel
ves
save
the
netw
ork
in
com
m
un
ic
at
ion
.
T
he
tw
o
ha
d
one
m
a
li
ci
ou
s
node
and
t
he
(
3)
had
thre
e
m
al
ic
iou
s
node
s
pe
rfor
m
ing
by
a
black
hole
at
ta
ck.
The
r
esults
of
these
(3)
sim
ulati
on
s
were
com
par
ed
t
o
com
pr
ehe
nd
t
he
netw
ork
a
nd
node
pract
ic
es.To
sta
rt,
we
assessed
t
he
P
DR:
Total
nu
m
ber
of
data
pack
et
s
delivere
d divi
de
d by total
num
ber
o
f data
pa
ckets se
nt [3
0]
.
Table
2
sho
ws
that
PD
R
was
alm
os
t
1
be
for
e
a
blac
khole
a
tt
ack,
T
his
m
e
ans
that
al
m
os
t
al
l
pack
et
s
sent
by
th
e
se
nd
e
r'
s
no
de
a
r
e
recei
ved
by
the
fu
t
ur
e
no
de
.
But
f
or
the
netw
ork
with
t
he
Bl
ac
khole
node,
I
lowe
red
the
P
DR
to
0,
w
hich
m
eans
that
al
l
pac
kets
se
nt
by
the
se
nd
e
r'
s
node
wer
e
dro
pp
e
d
by
t
he
Bl
ackhole
con
t
ract.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
1
3
, N
o.
2
,
Fe
bru
ary
201
9
:
6
77
–
682
680
Table
2.
PD
R
Com
par
ison
No
.
o
f
no
d
es
No
.
o
f
black
h
o
le attacks
Sin
g
le black
h
o
le attack
Co
o
p
erative attack
20
9
3
.67
7
6
2
9
5
.14
0
9
3
9
0
.03
2
7
5
40
9
2
.71
2
8
2
9
2
.22
6
6
8
9
1
.34
9
4
5
60
9
7
.36
5
7
5
9
8
.78
5
0
1
9
8
.04
6
6
5
80
8
5
.58
2
5
4
9
0
.95
5
8
7
9
.20
6
7
6
100
6
9
.67
8
0
9
7
0
.11
4
2
4
6
5
.12
1
6
Figure
3
u
ses
t
he
data
from
T
able
2,
w
hich
c
om
par
es
the
P
DR
be
fore
a
bl
ackhole
at
ta
ck
and
a
fter
one
and tw
o black
hole
att
acks.
Figure
3
.
P
DR
Table
3
s
hows
the
e
nd
-
to
-
en
d
delay
(T
he
aver
a
ge
ti
m
e
us
e
d
by
a
dat
a
pack
et
to
be
se
nt
t
o
t
he
destinat
io
n).
It
is
com
pu
te
d
as
the
ave
rag
e
of
the
s
pecific
e
nd
-
to
-
e
nd
delay
of
eve
ry
pac
ke
t,
th
us
e
xtracti
ng
the
aver
a
ge
en
d
-
to
-
en
d
delay
for
the
entire
network).
T
her
e
wer
e
e
nd
-
to
-
en
d
delay
inc
rea
ses
in
sit
uatio
ns
wit
h
black
ho
le
at
ta
cks
as
a
resu
lt
of
droppin
g pac
kets
wh
e
n rece
ive p
ac
kets
by
black
ho
le
no
de
s.
Fig
ure
4 w
hich
is draw
n from
ab
ove ta
ble’s
i
nfor
m
at
ion
c
om
par
es end
-
to
-
end d
el
ay
befo
re
black
ho
le
at
ta
ck
a
nd after
one
and th
ree c
oope
rati
ve
at
ta
cks:
Table
3.
E
nd
-
to
-
En
d Dela
y C
om
par
ison
No
.
o
f
no
d
es
No
.
o
f
black
h
o
le attacks
Sin
g
le black
h
o
le attacks
Co
o
p
erative attacks
20
0
.00
3
6
0
1
0
.00
2
2
0
6
0
.02
2
1
2
5
40
0
.00
8
6
2
7
0
.00
8
8
0
5
0
.01
0
4
4
6
60
0
.00
7
7
2
3
0
.00
6
7
9
1
0
.00
9
2
9
80
0
.01
0
5
4
8
0
.01
6
1
5
1
0
.01
4
6
8
2
100
0
.01
4
7
6
8
0
.01
4
7
1
7
0
.01
7
2
4
3
Figure
4
.
Dela
y
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Black
ho
le
atta
ck be
ha
vi
oral
analysis
gen
e
r
al n
et
w
or
k sc
al
ab
il
it
y
(
La
yt
h
A. Khali
l Al
Dulaimi
)
681
Table
4
s
hows
thr
oughput
(
de
fine
d
as
t
he
rati
o
of
t
he
nu
m
ber
of
bits
receiv
ed
ov
e
r
the
tim
e
dif
fer
e
nc
e
betwee
n
t
he
fir
st
an
d
t
he
la
st
r
ecei
ved
pa
cket
s).
F
or
di
ver
se
sit
uations
.
When
e
nteri
ng
the
blac
khole,
no
des
i
n
the
netw
ork
r
oute
request
thr
ough
put
i
ncr
ea
se.
T
his
im
plies
that,
a
fter
a
bl
ackhole
at
ta
ck
,
the
num
ber
of
dat
a
pack
et
s
that c
om
m
un
ic
at
e are f
e
wer
t
han the
num
ber
of c
ontrol
pack
et
s
ge
ner
at
e
d.
Table
4.
T
hro
ughp
ut
Com
par
ison
No
.
o
f
no
d
es
No
.of
black
h
o
le attacks
Sin
g
le black
h
o
le attacks
Co
o
p
erative attacks
20
1
3
4
3
5
7
1
3
6
4
6
0
.3
1
2
9
1
3
1
.2
40
3
0
8
7
7
8
.3
3
0
7
3
8
9
.1
3
0
4
8
7
1
.4
60
4
1
8
7
8
1
.9
4
2
4
8
8
7
4
2
1
7
1
0
.5
80
4
9
0
6
4
4
.1
4
2
4
3
4
7
.6
4
5
4
0
9
0
.8
100
4
9
9
4
3
8
.3
3
5
3
8
0
2
.2
4
6
6
7
7
6
.1
Figure
5
us
es
da
ta
fr
om
T
able
4,
wh
ic
h
com
par
es
thr
ou
ghpu
t
bef
ore
a
black
ho
le
at
ta
ck
a
nd
after
sin
gle
and co
operati
ve
b
la
ck
hole
att
acks.
Figure
5
.
Th
r
ough
pu
t
5.
CONCL
US
I
O
N
In
M
ANETs,
nodes
de
pend
on
each
oth
e
r
to
kee
p
the
ne
twork
a
sso
ci
at
ed.
In
this
m
a
nn
e
r,
unli
ke
custom
ary
wir
el
ess
arr
a
ngem
ents,
s
uc
h
netw
orks
do
no
t
require
a
ny
pr
e
vious
(sett
le
d)
f
ound
at
io
n,
w
hich
lim
it
s
their
co
st
an
d
sen
ding
ti
m
e.
Hence
,
sec
ur
i
ty
in
MANE
T
s
is
the
great
e
st
con
ce
r
n
w
he
n
c
on
si
der
i
ng
the
fun
dam
ental
us
efu
l
ness
of
s
uc
h
netw
orks
.
MANET
s
regu
la
rly
ex
per
ie
nc
e
the
il
l
eff
ect
s
of
secu
rity
assault
s
because
of
el
e
m
ents
su
c
h
as
op
e
n
m
edium
,
dynam
ic
chang
es
to
thei
r
t
opol
og
y,
the
a
bs
e
nc
e
of
f
ocal
obser
v
at
ion
and
a
dm
inist
rati
on
,
helpful
a
lgorit
hm
s
and
no
rea
sona
ble
de
fe
nce
m
ec
han
ism
s.
Bl
ackhole
at
ta
cks
are
a
n
interest
ing t
opi
c f
or
m
any res
earche
rs.
Hen
ce
,
in
this work, w
e
a
nal
yse
d
the
ef
fects
of b
la
ck
ho
le
s
in
a
n
AOD
V
ne
twork
.
F
or
thi
s
reas
on, w
e
app
li
ed
a
n
A
O
DV
protoc
ol
t
hat
beh
a
ves
li
ke
a
black
hole
i
n
t
he
OMN
ET
++
sim
ulator
(
4.2.2)
.
We
sim
ulate
d
three
sce
nar
i
os
on
20,
40,
60,
80
a
nd
100
no
des,
wh
e
re
the
si
m
ulati
on
was
com
plete
d
us
ing
U
DP
pac
ke
ts.
In
each
sit
uatio
n,
we
assesse
d
ne
twork
perf
orm
ance
before
a
nd
a
fter
si
ng
l
e
and
c
oope
rat
ive
black
hole
at
ta
cks.
We
in
vestigat
e
d
the
ef
fects
of
blac
khole
at
t
acks
on
netw
ork
pe
rfor
m
ance,
noti
ng
that
at
ta
cks
inc
reas
ed
the
nu
m
ber
of
dro
pp
e
d
pac
kets
a
nd
decr
eas
ed
t
he
PD
R
.
E
ve
n
w
he
n
i
ncr
ea
sing
the
num
ber
of
blac
khole
node
s
,
dro
pp
e
d
pac
ke
ts
increa
sed
an
d
PD
R
dro
ppe
d
off.
Bl
ack
ho
l
e
at
ta
cks
i
ncr
e
ased
t
he
num
ber
of
droppe
d
pack
et
s
and d
ec
rease
d PDR in
MA
N
ET p
e
rfo
rm
ance.
REFERE
NCE
S
[1]
V. A
nil
Kum
ar,
R.
C.
Jos
hi,
and
M. G
uide
D
ave
“
Design
and dev
el
opm
ent
of
a
ro
uti
ng
pro
toc
ol
fo
r
m
obil
e
ad
hoc
”.
PhD
diss
,
2008
.
[2]
N.
H.
Mistr
y
,
D.
C
Jinwala,.
and
M.A
Za
ver
i,.,.
MO
SAODV
:
“
s
olut
ion
to
se
cur
e
AO
DV
aga
inst
bla
ck
hole
atta
c
k
”.
IJCNS
.
In
te
rnati
onal
Journal
of
Computer
and
N
et
work
S
ec
urit
y.
2009,
1(3):
42
-
4
5.
[3]
M.
Console
e,
an
d
A.
Shah
rab
i
.
“
Com
par
at
ive
stu
d
y
of
r
eact
iv
e
an
d
proa
ct
iv
e
rou
ting
protoc
o
ls
pe
rf
orm
anc
e
in
m
obi
le
ad
ho
c
n
et
works
”.
In
Adv
an
ce
d
I
nformation
Ne
tw
orking
and
App
licati
ons
Wor
ksh
ops,
AIN
AW'07.
2
1st
Inte
rnat
ional
Confe
renc
e
on
2
007,
2:
679
-
684
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
1
3
, N
o.
2
,
Fe
bru
ary
201
9
:
6
77
–
682
682
[4]
C.
R
anajo
y
,
and
M.
Routr
a
y
.
“
B
la
ck
Hol
e
Com
b
at
Us
ing
Node
S
ta
bilit
y
S
y
s
te
m
i
n
MA
NET.
In
I
nte
rna
ti
ona
l
Join
t
Confer
ence
on
Advanc
es
in
Sig
nal
Proce
ss
ing
a
nd
Inform
at
ion”.
Technol
ogy
Springer
Berlin
Hei
del
ber
g
.
2011,
,
1:
249
-
254.
[5]
N.
Adnan,
and
M.
How
art
h
.
“
Protection
of
M
AN
ET
s
from
a
ran
ge
of
a
tt
a
cks
using
an
int
rus
ion
d
etec
t
ion
and
pre
vention
s
y
s
tem
”.
T
el
e
comm
u
nic
a
ti
on
S
y
stems
2013,
52(4):
204
7
-
2058.
[6]
L.
Nai
-
W
ei,
and
F.
Li
u
.
“
A
sec
ure
routi
ng
p
ro
toc
ol
to
pre
v
ent
coop
e
rat
iv
e
b
la
ck
hol
e
at
t
ac
k
in
MA
NET”
.
In
Int
el
l
ige
nt
Te
chno
logi
es
an
d
Engi
n
ee
ring
S
y
stems
Springer
New York,
2013
.
pp
.
59
-
65
.
[7]
P.
Niroj
Kum
ar,
and
S.
Mishra
.
“
Secur
e
H
y
brid
R
outi
ng
for
MA
NET
Resilient
to
I
nte
rna
l
and
Ex
ternal
Attacks”
.
IC
T
and
Cri
ti
c
al Infr
astruc
tur
e:
Pro
ceedi
ngs of the
48t
h
Annual
Conv
e
nti
on
of
Com
pute
r
Soci
ety
of
Ind
ia
-
Vol
I
.
Spring
e
r
Inte
rna
ti
ona
l
Pu
bli
shing2014,
1: 449
-
458.
[8]
S.
Um
ang,
B.
R
edd
y
,
and
M
.
N.
Hoda.
“
Enha
nc
ed
in
trusion
d
et
e
ct
ion
s
y
st
em
for
m
al
ic
ious
nod
e
det
e
ct
ion
in
ad
h
oc
routi
ng
pro
toc
ol
s using
m
ini
m
al
ene
rg
y
consum
pti
on”
.
I
ET
communic
a
ti
ons 2010 4(17):
2084
-
209
4.
[9]
J.,
Shahra
m
Beh
za
d
Shahra
m
.
“
A
surve
y
over
b
la
ck
ho
le
at
t
ac
k
det
e
ct
ion
in
m
obil
e
ad
hoc
n
et
w
ork”
.
Int
ern
a
ti
on
al
Journal
of
Com
p
ute
r
Sc
ie
nc
e
and
Network
Se
cur
i
t
y
(IJCS
NS
)
2015.
15(3):
44
.
[10]
T.
Tejasvi,
N.
Arora,
and
P.
V
y
as.
“
Liter
at
ur
e
Surve
y
of
MA
NET
under
Bla
ckhole
and
Gra
y
ho
le
a
ttac
k”
.
Inte
rna
ti
ona
l
Jou
rna
l
of
Advanc
e
d
Resea
r
ch in
C
om
pute
r
and
Co
m
m
unic
at
ion
En
gine
er
ing. 2015,
4(9).
[11]
T
.
F
an
-
Hs
un,
L
.
Chou
,
and
H.
Chao.
“
A
surve
y
of
b
la
ck
hol
e
a
tt
a
cks
in
wire
le
s
s
m
obil
e
ad
hoc
net
works
”.
2011
Hum
an
-
ce
ntri
c
Com
puti
ng
and
I
nform
at
ion
Sci
e
nce
s 1(1): 4.
[12]
Y.
Bo,
R
.
Yam
amoto,
and
Y.
Ta
nak
a.
“
Histori
ca
l
evi
den
ce
b
a
sed
trust
m
an
ag
ement
st
rateg
y
a
g
ai
nst
black
hol
e
at
t
ac
ks
in
MA
NET”.
In
Adv
anc
e
d
Com
m
unic
at
io
n
Technol
og
y
(I
CACT),
2012
14
th
Int
ern
ational
Confer
ence
on
,
p
p.
394
-
399.
[13]
R.
Nanda
kum
ar
,
and
K.
Ni
rm
al
a
.
“
Secur
ity
Cha
ll
e
nges
in
Mobi
le
Ad
Hoc
Networ
k
-
A
Serve
y
”
.
A
ustral
i
an
Journal
o
f
Basic
and
Appl
i
ed
Sci
ences2016,
10:
654
-
66.
[14]
W
.
Bing
,
J
.
Che
n,
J.
W
u,
and
M
.
Ca
rde
i
.
“
A
sur
ve
y
of
atta
cks
a
nd
counterm
ea
s
ure
s
in
m
obil
e
a
d
hoc
net
works
.
In
W
ire
le
ss
net
wor
k
sec
uri
t
y
”
,
Spri
nger
US
,
2007
p
p.
103
-
135
.
[15]
L.
Al
-
Dulai
m
i
,
Al,
,
B.
Ahm
ad,
and
L
.
A.
Hass
nawi
.
“
Black
H
ole
Mal
ic
ious
B
eha
viour
Via
Di
ffe
ren
t
Detect
io
n
Methods”.
2016.
10(16):149
-
160.
[16]
M
Sergio
,
J
.
Th
om
as
G.
Kevin
La
i
,
and
M
.
B
ak
er.
“
Miti
gating
r
outi
ng
m
isbeha
v
ior
in
m
obil
e
ad
hoc
n
et
works
”.
I
n
Proce
edi
ngs
of
t
he
6
th
annua
l
in
te
rna
ti
ona
l
conf
e
ren
ce
on
Mobil
e
computing
and
net
working.
AC
M,2000.
pp
.
255
-
265.
[17]
V.
Kam
at
ch
i,
,
a
nd
R.
Mukesh.
"
Secur
ing
data
fro
m
bla
ck
ho
le
a
tta
ck
using
aodv
ro
uti
ng
for
m
obil
e
ad
ho
c
net
works
"
.
Advanc
es
in
Co
m
puti
ng
and
In
f
orm
at
ion
T
ec
hn
olog
y
.
Spring
er Berl
in
Heidelbe
r
g,
3102
pp
:365
-
373.
[18]
S.
Casado,
Le
ov
i
gil
do,
R
.
A.
Rodrígue
z
-
Góm
ez,
R.
Magá
n
-
C
arr
ió
n,
and
G
.
Mac
iá
-
Ferná
ndez.
"N
E
TA:
evalua
ti
ng
t
he
eff
ects
of
NETw
ork
at
t
ac
ks.
MA
NETs
as
a
c
ase
stud
y
.
"
In
Advan
ce
s
in
Secu
rity
o
f
Inform
at
ion
an
d
Com
m
unic
at
io
n
Networks,
Sprin
ger
Ber
li
n
Heidelbe
rg, 2013
pp
.
1
-
10.
[19]
P.
Bhoom
ika
,
a
nd
K.
Tri
v
edi.
I
m
proving
AO
D
V
“
Routi
ng
Protocol
ag
ai
nst
B
lack
Hole
At
tack
base
d
on
MA
NET”.
IJCS
IT)
Inte
rna
t
iona
l
Journal
of C
om
pute
r
Scie
n
ce
and
Inform
a
tion T
e
chnol
ogi
es
.
2014
.
5(3):
358
6
-
3589.
[20]
S.
Ran
je
e
t,
an
d
S.
Ta
m
hank
a
r.
“
Perform
anc
e
ana
l
y
sis
and
m
ini
m
iz
at
ion
of
bla
ck
hole
att
ac
k
in
MA
NET”
.
Inte
rna
ti
ona
l
Jou
rna
l
of
Eng
ine
er
i
ng
Resea
r
ch and
Applicati
ons
(IJERA),2012
ISS
N:
2248
-
9622.
[21]
C.
Apoorva
,
and
S.
Tha
kur.
“
Perform
anc
e
eva
lu
a
ti
on
of
h
y
brid
r
outi
ng
pro
t
ocol
s
against
n
et
wor
k
lay
e
r
at
t
ac
ks
i
n
MA
NET”
.
Next
Gene
ration
Com
puti
ng
T
ec
hnolo
gie
s
(NG
CT),
20
15
1st
Inte
rna
ti
o
nal
Confer
ence
o
n.
IEEE,
pp
.
239
-
244.
[22]
S.
Abdul
-
R
ahman,
and
R.
Ham
a
m
reh
.
“
Eff
i
ci
en
t
Mec
hani
sm
For
Miti
gating
Mul
tiple
B
lack
Hol
e
Atta
cks
In
Man
e
ts”.
Journal
of Theor
et
i
ca
l
and
Appli
ed
Inform
at
io
n
Te
chno
log
y
.
201
6
83(1):
156
.
[23]
T.
Nav
amani,
and
P.
Yogesh.
“
Secur
e
Eff
ic
i
ent
Rou
ti
ng
ag
ai
nst
Pa
cket
Dr
opping
Att
ac
ks
in
W
ire
l
ess
Mesh
Networks”.
In
P
roc
ee
d
ings
of
th
e
3rd
Int
ern
a
ti
o
nal
Confer
en
ce
on
Front
iers
of
Inte
lligen
t
Sprin
ger
In
te
rn
at
ion
al
Publishing,
2015.
pp.
673
-
686
.
Evaluation Warning : The document was created with Spire.PDF for Python.