BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 6
Abstract
MANET is a self configurable, self deployable and infrastructure less network in which nodes are continuously moving and creates dynamic topology. For routing the main protocols using are AODV, OLSR, DSDV, DSR etc. AODV and DSR are reactive protocols, where DSDV and OLSR are proactive protocols. This paper deals with AODV and OLSR protocols. Since the topology is dynamic the attacker presence is more. Many attacks such as black hole, worm hole, grey hole , flooding attack etc can occur among this black hole is the main one. The attacker acts as a black node which will fake the source node showing more attractive path to the destination. As a result the source will forward the data through the black node and it will drop the packets. This paper presents a survey on black hole attack in OLSR and AODV protocols and the corresponding mitigation techniques.
Authors and Affiliations
Anjaly Joy , Sijo Cherian
Medical Disease Diagnosis Using Structuring Text
Medical diagnosis is an important domain of research which aids to identify the occurrence of a disease. The paper proposes a novel glide path to knowledge discovery in medical systems by acquiring relevant information f...
Smart Green House Automation
Smart Green House Automation is a complete system to monitor and control the environment parameters inside a green house .It is necessary to design a control system to monitor various parameters like Temperature, Humidit...
Modern Steganographic technique: A survey
Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...
A Secure and Privacy Preserving Technique in Distributed Information Sharing using AES Encryption and Genetic Algorithm
In many organizations distributed information sharing is used to share data in a large network. In distributed Information sharing there are many chances to hack the technical and personal information of client and serve...
Study Of Multidomain Query Optimization And Answering
In queries having multiple domains it is seen that general purpose search engines are not able to answer multidomain queries and one of the domain is considered by specific search services but no integrated framework is...