BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 6
Abstract
MANET is a self configurable, self deployable and infrastructure less network in which nodes are continuously moving and creates dynamic topology. For routing the main protocols using are AODV, OLSR, DSDV, DSR etc. AODV and DSR are reactive protocols, where DSDV and OLSR are proactive protocols. This paper deals with AODV and OLSR protocols. Since the topology is dynamic the attacker presence is more. Many attacks such as black hole, worm hole, grey hole , flooding attack etc can occur among this black hole is the main one. The attacker acts as a black node which will fake the source node showing more attractive path to the destination. As a result the source will forward the data through the black node and it will drop the packets. This paper presents a survey on black hole attack in OLSR and AODV protocols and the corresponding mitigation techniques.
Authors and Affiliations
Anjaly Joy , Sijo Cherian
Multimodal Biometrics An Effective Approach of Person Identification : A Review
In new era, the biometric systems high security applications must match with perfect requirement of real world. This paper gives an overview of multimodal biometrics as well as different fusion of multiple biometrics whi...
A SURVEY ON LUNG SEGMENTATION TECHNIQUES
Interstitial lung disease is one of the main treat to the health .Computer Tomography is used for assessment of interstitial lung disease .But sometimes it is difficult to visually interpret because of the crossing and o...
HYBRID PERSONALIZED RECOMMENDATION APPROACH FOR IMPROVING MOBILE E-COMMERCE
In recent years, the massive influx of information onto internet has facilitated user, not only retrieving information, but also discovering facts. However, web users usually suffer from the information overload problem...
Spontaneous identification of individual nick name from web
A person is generally called by different names, it is difficult to identify a person from the web, person will be called by different names by different people for example, Michael Jackson is called as MJ and some call...
VOICE ENABLED ONTOLOGY BASED SEARCH ENGINE ON SEMANTIC WEB FOR BLIND
With the development of web services, the retrieval of relevant services has become a challenge. Keyword based discovery mechanism is insufficient, due to retrieval of large amount of irrelevant information. Here we prop...