CFP last date
01 May 2024
Reseach Article

To Detect and Overcome Sinkhole Attack in Mobile Ad hoc Network

by Vivek Tank, Amit Lathigara
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 6
Year of Publication: 2015
Authors: Vivek Tank, Amit Lathigara

Vivek Tank, Amit Lathigara . To Detect and Overcome Sinkhole Attack in Mobile Ad hoc Network. Communications on Applied Electronics. 2, 6 ( August 2015), 1-5. DOI=10.5120/cae2015651718

@article{ 10.5120/cae2015651718,
author = { Vivek Tank, Amit Lathigara },
title = { To Detect and Overcome Sinkhole Attack in Mobile Ad hoc Network },
journal = { Communications on Applied Electronics },
issue_date = { August 2015 },
volume = { 2 },
number = { 6 },
month = { August },
year = { 2015 },
issn = { 2394-4714 },
pages = { 1-5 },
numpages = {9},
url = { },
doi = { 10.5120/cae2015651718 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2023-09-04T19:40:44.751933+05:30
%A Vivek Tank
%A Amit Lathigara
%T To Detect and Overcome Sinkhole Attack in Mobile Ad hoc Network
%J Communications on Applied Electronics
%@ 2394-4714
%V 2
%N 6
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

Mobile ad-hoc network abbreviated as MANET is most emerging and highly demanding wireless network technology. Due to the property of self-deliberate, where all point of network behaves like source or router and also all nodes are keeps on moving freely in network area. Mobile ad hoc network perform important role in connectionless environment. Security is the most fundamental requirement in mobile ad hoc network to secure the sensitive information from hackers. In MANETs typically many attacks are routing protocol attacks. Sinkhole attack is one of the most severe attacks in MANETs. It tries to attract all neighbor nodes to itself and broadcast fake or bogus routing path. Here sinkhole attack describes in AODV routing protocol to applying security by using digital signature and hash chain to prevent the attack.

  1. Immanuel john raja jebadurai, Elijah Blessing Rajasingh, “A survey on sinkhole attack detection methods in mobile ad hoc networks”, 2011 3rd International Conference on Machine Learning and Computing (ICMLC 2011)-IEEE, 978-1-4244-925 3-4.
  2. Gangdeep, Aashima, Pawan kumar, “Analysis of different security attacks in MANETs on protocol stack-A review”, International Journal of Engineering Advanced Technology (IJEAT), ISSN: 2249-8958, Volume-1, Issue-5, june-2012.
  3. K. Kim, S.Kim, “A sinkhole detection method based on incremental learning in wireless ad hoc networks”.
  4. R.Madhumathi, J.Jenno Richi Benat, “Attacks in mobile adhoc networks: Detection and counter measure”, International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN), ISSN No. 2248-9738 (Print), Vol-2, Iss-1, 2012.
  5. Jeba veer singh jebadurai, Alfred raja melvin A, Immanuel john raja jebadurai, "Sinkhole detection in mobile ad hoc network using mutual understanding among nodes". India. IEEE-2011.
  6. Gisung Kim, Younggoo Han, SehunKim, “A cooperative-sinkhole detection method for mobile ad hoc networks”, International Journal of Electronics and Communication. 64 (2010) 390397.
  7. Khusboo Tunwal, Priyanka singh dabi, pankaj sharma, "An individual trust management technique for mitigating sinkhole attack in manet", International journal of computer application(0975-8887), volume 95-No.24, june-2014.
  8. Thanachai T., Tapanan Y. and Punthep S., “Adaptive Sinkhole Detection on Wireless Ad Hoc Networks”, Assumption University, Thailand. IEEE 2006.
  9. Gagandeep, Aashima, Pawan Kumar, “Study on Sinkhole Attacks in Wireless Ad hoc Networks”, International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397, Volume-4, Issue-5, June 2012
  10. Nisarg Gandewar , Rahila Patel , “Detection and Prevention of sinkhole attack on AODV Protocol in Mobile Adhoc Network”, fourth international conference on CICN, IEEE-2012.
  11. Woochul Shim, Gisung Kim, Sehun Kim, “A distributed sinkhole detection method using cluster analysis”, 0957-4174, 2010-Elsevier.
  12. Usha G and Dr.Bose S, “Impact of Sinking behaviour in Mobile adhoc network”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
  13. Benjamin J. Culpepper, H.Chris Tseng,” Sinkhole Intrusion Indicators in DSR MANET”, First International Conferenc on broadband networks IEEE 2004.
  14. Marchang N, Datta R., “Collaborative techniques for intrusion detection in mobile ad-hoc networks”, Ad hoc networks 6(2008) 508-523, Elsevier-2008.
  15. Ad hoc On-demand distance vector (AODV) routing ietf-draft-manet-aodv-13.txt.
  16. Mouhamad Ibrahim, “Introduction to network simulator”.
  17. NS-2. The ns manual (formally known as NS documentation) available at
  18. T. Mishra, B. Singh, A. Kumar, “A Security Scheme for Mobile Ad-hoc Network with Reduced Routing Overhead”, IJARCSSE journal, Volume 3, Issue 8, August 2013
  19. L. Reyzin and N. Reyzin, “Better Than BIBA: Short One- Time Signatures With Fast Signing and Verifying”, 7th Australasian Conference on Information Security and Privacy, LNCS 2384, April- 2002.
  20. M. Zapata, “Key Management and Delayed Verification for ad hoc Networks”, Hi1gh Speed Networks, volume-15, no-1, January 2006
  21. Shidi Xu, Yi Mu and W. Susilo, “Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes”, Journal of network
Index Terms

Computer Science
Information Sciences


Sinkhole Attack Mobile ad hoc network Routing protocol Security Digital signature