Black hole attack is one of the active DoS attacks possible in MANETs so has got lots of attention by the researchers. Research focus mainly given to securing existing routing protocols, developing new secure routing protocols, and intrusion detection techniques. Researchers have proposed various techniques to prevent black hole attack in mobile ad-hoc networks. Many studies on MANET focus on the protocols used their security issues such as data encryption, authentication, trust, and cooperation among nodes, attacks on the protocols and proposed solutions or preventions.Copy Right, IJAR, 2016,. All rights reserved.
Literature Survey:-Buchegger and Le Boudec present the CONFIDANT protocol. Each node monitor the behavior of its next hop neighbors in a similar manner to watchdog. The information is given to the reputation system that updates the rate of the nodes. Based on the rating, the trust manager makes decisions about providing or accepting route information, accepting a node as part of a route and so on. When a neighbor is suspicious in misbehaving, a node informs its friends by sending them an ALARM message. If a node"s rating turns out to be intolerable, the information is relayed to the path manager, which proceeds to delete all routes containing the intolerable node from the path cache. This does not address partial packet dropping.Michiardi and Molva proposes the CORE scheme and various related issues in. In this scheme, every node computes a reputation value for every neighbor, based on observations that are collected in the same way as watchdog. The reputation mechanism differs between subjective reputation, indirect reputation, and functional reputation. Subjective reputation is calculated directly from neighbors past and present observations, giving more relevance to past observations in order to minimize false detection influence. Indirect reputation is the information collected through interaction and information exchange with other nodes using positive values only. Functional reputation is the global reputation value associated with every node. By avoiding the spread of negative rating, the mechanism resists attacks, such as denial of service. When a neighbor reputation falls below a predefined value, the service provided to the misbehaving node is suspended. The working of the model and its performance were not reported.Banal and Baker propose OCEAN, a scheme for robust packet-forwarding. OCEAN, similarly to previous schemes, is based on nodes" observations. In contrast to previous mechanisms, no rating is exchanged and every node relies on its own information, so the trust management is avoided. The rating is based on a counter that counts the positive and the negative steps a node performs and based on a faulty threshold, the node is added to a faulty list. In the method for route selection, a DSR node appends an avoid list to every generated RREQ and a RREP based on this list. A second-chance mechanism is provided to give nodes that were previously considered misbehaving another opportunity t...