BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR

Abstract

MANET is a self configurable, self deployable and infrastructure less network in which nodes are continuously moving and creates dynamic topology. For routing the main protocols using are AODV, OLSR, DSDV, DSR etc. AODV and DSR are reactive protocols, where DSDV and OLSR are proactive protocols. This paper deals with AODV and OLSR protocols. Since the topology is dynamic the attacker presence is more. Many attacks such as black hole, worm hole, grey hole , flooding attack etc can occur among this black hole is the main one. The attacker acts as a black node which will fake the source node showing more attractive path to the destination. As a result the source will forward the data through the black node and it will drop the packets. This paper presents a survey on black hole attack in OLSR and AODV protocols and the corresponding mitigation techniques.

Authors and Affiliations

Anjaly Joy , Sijo Cherian

Keywords

Related Articles

Different Algorithms used in Image Encryption: A review

As a result of the development of computer network technology, communication of information through personal computer is becoming more convenient. Meanwhile, it also gives hackers opportunities to attack the network. The...

Multimodal Biometrics An Effective Approach of Person Identification : A Review 

In new era, the biometric systems high security applications must match with perfect requirement of real world. This paper gives an overview of multimodal biometrics as well as different fusion of multiple biometrics whi...

A NEW STATISTICAL APPROACH FOR IMAGE FUSION TECHNIQUE

Image Fusion is an emerging area of research in image processing and computer vision. This paper proposes an algorithm which is statistical based and it overcomes the shortcomings of the traditional image fusion algorith...

Modified 4-Bit Comparator Using Sleep Technique

The development of digital integrated circuits is challenged by higher power consumption. So low power circuits have become a top priority in modern VLSI design. This paper presents layout simulations of a new improved f...

Enigmatic Power of Turing Machines: A Review 

Automata are said to be theoretical devices which help in understanding the reasoning behind computations and are considered to be ideal rather than realistic. This is because the actual computers cannot have infinite me...

Download PDF file
  • EP ID EP98665
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Anjaly Joy, Sijo Cherian (2013). BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR. International Journal of Computer Science & Engineering Technology, 4(6), 740-745. https://europub.co.uk/articles/-A-98665