International Journal of Computer Applications
In this paper, the authors consist of a brief description of various issues on security of Ad hoc networks as well as counter work against Black Hole Attack. A combat approach against black hole attack is truly based on cooperation of individual nodes of MANET. In this paper, each individual node act as intrusion detection system and monitors each request that it receives to avoid the attack. For this they use the routing table as well as to authenticate the sender node. They use ns2 for implementation and to simulate the proposed algorithm.