BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR

Abstract

MANET is a self configurable, self deployable and infrastructure less network in which nodes are continuously moving and creates dynamic topology. For routing the main protocols using are AODV, OLSR, DSDV, DSR etc. AODV and DSR are reactive protocols, where DSDV and OLSR are proactive protocols. This paper deals with AODV and OLSR protocols. Since the topology is dynamic the attacker presence is more. Many attacks such as black hole, worm hole, grey hole , flooding attack etc can occur among this black hole is the main one. The attacker acts as a black node which will fake the source node showing more attractive path to the destination. As a result the source will forward the data through the black node and it will drop the packets. This paper presents a survey on black hole attack in OLSR and AODV protocols and the corresponding mitigation techniques.

Authors and Affiliations

Anjaly Joy , Sijo Cherian

Keywords

Related Articles

Linear Time Sorting Algorithm for Large Integer Data-set

Dealing with the data is the basic task of almost every computer application. When we want to manipulate data sets then it is always easy to do that with sorted data sets. Today’s computer applications are dealing with b...

Transition Bandwidth Analysis of Infinite Impulse Response Filters

Infinite impulse response (IIR) is a property applying to many linear time-invariant systems. Digital filters are the common example of linear time invariant systems. Systems with this property are called IIR systems or...

Survey: A Techniques implemented on Opinion Mining

Opinion mining is the mining of attitudes, emotions and data sources through Natural Language Processing. It is used for providing a good recommenda tion to the users. Nowadays millions of users express their opinion thr...

Firewall Management for to Resolve the Policy Anomalies

Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis t...

SURVEY ON BIG DATA MINING PLATFORMS, ALGORITHMS AND CHALLENGES

“Big data” is coined to address massive volumes of data sets usually huge, sparse, incomplete, uncertain, complex or dynamic, which are mainly coming from multiple and autonomous sources. The primary sources for big data...

Download PDF file
  • EP ID EP98665
  • DOI -
  • Views 132
  • Downloads 0

How To Cite

Anjaly Joy, Sijo Cherian (2013). BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR. International Journal of Computer Science & Engineering Technology, 4(6), 740-745. https://europub.co.uk/articles/-A-98665