Detecting and Eliminating Blackhole Attacks for Improving the Quality of Service of Mobile Ad-Hoc Networks Using RTS-CTS Mechanism


  • Ganesh Dhondu Dangat , S .Murugan


MANET, Blackhole Attack, RTS-CTS Mechanism, Detecting Malicious Activities, Preventing Network.


Mobile Adhoc Network is one of the infrastructures-less, decentralized wireless networks that can reconfigure by itself. MANET does not depend on the access points in the network, where it can accommodate any existing infrastructure. Since it is an ad-hoc network, all the nodes in the MANET are mobile nodes connected wirelessly. Depending on the routing protocols, single-hop, two-hop, and multi-hop-based data transmission is followed in the MANET. These models provide more opportunities for malicious activity creation in the network, where it destroys data transmission and loss. Several earlier research works have focused on detecting and eliminating malicious activities. One of the dangerous attacks that defy detection of the physical properties is the Blockhole attack, and they don't respond to its sender and receiver nodes. Compared to other malicious attacks, blackhole attacks result in a small amount of data loss in the network, and they are considered a major research problem in MANET. This paper has aimed to provide a better solution using the RTS-CTS mechanism and initialize the data transmission with dummy data to detect the black hole nodes. Once the black nodes are identified in the network, they are eliminated immediately, and their functionalities are with the neighbor nodes. The simulation results obtained from NS2 show that the proposed RTS-CTS mechanism outperforms and provides better QoS.


Download data is not yet available.


Dhaka, A., Nandal, A., & Dhaka, R. S. (2015). Gray and black hole attack identification using control packets in MANETs. Procedia Computer Science, 54, 83-91.

Siddiqua, A., Sridevi, K., & Mohammed, A. A. K. (2015, January). Preventing black hole attacks in MANETs using secure knowledge algorithm. In 2015 International Conference on Signal Processing and Communication Engineering Systems (pp. 421-425). IEEE.

Naveena, S., Senthilkumar, C., & Manikandan, T. (2020, March). Analysis and countermeasures of blackhole attack in manet by employing trust-based routing. In 2020 6th international conference on advanced computing and communication systems (ICACCS) (pp. 1222-1227). IEEE.

Choudhury, D. R., Ragha, L., & Marathe, N. (2015). Implementing and improving the performance of AODV by receive reply method and securing it from Black hole attack. Procedia Computer Science, 45, 564-570.

Srinivasan, V. (2021). Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET. Ingénierie des Systèmes d'Information, 26(6).

Rani, P., Verma, S., & Nguyen, G. N. (2020). Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access, 8, 121755-121764.

Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. (2019). Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 151, 1176-1181.

Thanuja, R., & Umamakeswari, A. (2019). Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. cluster computing, 22(2), 3131-3143.

Pandey, S., & Singh, V. (2020, July). Blackhole attack detection using machine learning approach on MANET. In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 797-802). IEEE.

Farahani, G. (2021). Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Security and Communication Networks, 2021.

Joseph, C., Kishoreraja, P. C., Baskar, R., & Reji, M. (2015). Performance evaluation of MANETS under black hole attack for different network scenarios. Indian Journal of Science and Technology, 8(29), 1-10.

Yadav, S., Trivedi, M. C., Singh, V. K., & Kolhe, M. L. (2017, October). Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme. In 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON) (pp. 1-4). IEEE.

Mahin, S. H., Taranum, F., Fatima, L. N., & Khan, K. U. (2019). Detection and interception of black hole attack with justification using anomaly based intrusion detection system in MANETs. International Journal of Recent Technology and Engineering, 8(11), 2392-2398.

Keerthika, V., & Malarvizhi, N. (2019). Mitigate black hole attack using hybrid bee optimized weighted trust with 2-Opt AODV in MANET. Wireless Personal Communications, 106(2), 621-632.

Eid, M. M., & Hikal, N. A. (2021). Enhanced Technique for Detecting Active and Passive Blackhole Attacks in MANET. In Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2020 (pp. 247-260). Springer International Publishing.

Moudni, H., Er-Rouidi, M., Mouncif, H., & El Hadadi, B. (2018). Fuzzy logic based intrusion detection system against black hole attack in mobile ad hoc networks. International Journal of Communication Networks and Information Security, 10(2), 366-373.

Khan, D. M., Aslam, T., Akhtar, N., Qadri, S., Rabbani, I. M., & Aslam, M. (2020). Black hole attack prevention in mobile ad-hoc network (manet) using ant colony optimization technique. Information Technology and Control, 49(3), 308-319.

Yasin, M. B., Khamayseh, Y. M., & AbuJazoh, M. (2016). Feature Selection for Black Hole Attacks. J. Univers. Comput. Sci., 22(4), 521-536.

Nagalakshmi, T. J., Gnanasekar, A. K., Ramkumar, G., & Sabarivani, A. (2021). Machine learning models to detect the blackhole attack in wireless adhoc network. Materials Today: Proceedings, 47, 235-239.

Hikal, N. A., Shams, M. Y., Salem, H., & Eid, M. M. (2021). Detection of blackhole attacks in MANET using adaboost support vector machine. Journal of Intelligent & Fuzzy Systems, (Preprint), 1-14.




How to Cite

Ganesh Dhondu Dangat. (2024). Detecting and Eliminating Blackhole Attacks for Improving the Quality of Service of Mobile Ad-Hoc Networks Using RTS-CTS Mechanism. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1897–1906. Retrieved from



Research Article