BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 6
Abstract
MANET is a self configurable, self deployable and infrastructure less network in which nodes are continuously moving and creates dynamic topology. For routing the main protocols using are AODV, OLSR, DSDV, DSR etc. AODV and DSR are reactive protocols, where DSDV and OLSR are proactive protocols. This paper deals with AODV and OLSR protocols. Since the topology is dynamic the attacker presence is more. Many attacks such as black hole, worm hole, grey hole , flooding attack etc can occur among this black hole is the main one. The attacker acts as a black node which will fake the source node showing more attractive path to the destination. As a result the source will forward the data through the black node and it will drop the packets. This paper presents a survey on black hole attack in OLSR and AODV protocols and the corresponding mitigation techniques.
Authors and Affiliations
Anjaly Joy , Sijo Cherian
Remote Wireless Automation and Monitoring of Large Farm using wireless sensors networks and Internet
The work includes designing and programming a control panel to watch and control the network by using LabView program which views changes values of the farm as well as the real values required for controlling max. and mi...
A Study on Application of Artificial Neural Network and Genetic Algorithm in Pattern Recognition
Image processing is an emerging field and lots of research had been performed for the past few years. Image processing has various techniques which are image segmentation, enhancement, feature extraction, classification,...
The Design and Implementation of Land Management Information System (LMIS), Bauchi State Ministry of Lands and Survey
The need to collection, store, process and disseminate information about land availability, ownership and titles is a fundamental task that should be performed by any responsible agency in charge of land administration....
An analysis of LEACH Protocol in Wireless Sensor Network: A Survey
Wireless Sensor Network is composed of numbers of tiny sensors (nodes) which have the capability of gathering the data about environmental activities and making certain computations on them so that they can be communicat...
Performance Analysis of Ad Hoc Routing Protocols in WSNs
The field of communications networks continues to emerge, thus leading to the rapid growth in the field of wireless sensor networks (WSNs). WSNs are noticeably different from traditional Ad hoc networks. The conspicuous...