International Journal of Emerging Trends & Technology in Computer Science
A Motivation for Recent Innovation & Research
ISSN 2278-6856
www.ijettcs.org
Call for Paper, Published Articles, Indexing Infromation
Title: |
ANALYSIS OF BLACK HOLE ATTACK ON AD HOC NETWORKS USING VARIOUS MOBILE AD HOC NETWORK ROUTING PROTOCOLS
|
Author Name: |
Dr. CHANDRA NAIK M, Dr.G.SAMBASIVA RAO |
Abstract: |
Abstract: In this scenario, ad hoc networks are gaining
quality to its peak today, as the users want, an ad hoc
connectivity irrespective of their GIS position. If there is more
than threat of attacks on the MANETs. Black hole attack is one
of the privacy threat in which the traffic is redirected to such a
node that actually does not exist in the network. It is an analogy
to the black hole in the universe in which things to discontinue
to be seen. The host to host presents it in such a way to the node
that it can attack other nodes and networks knowing that it has
the shortest path. MANETs must have a privacy way for
transmission and communication which is quite challenging
and characteristic issue. In order to provide privacy
communication and transmission, researcher worked
specifically on the privacy issues in ad hoc networks, and many
privacy routing protocols and privacy measures within the
networks were discussed. Presently the works done on privacy
issues in ad hoc network were based on reactive routing
protocol like Ad-Hoc On Demand Distance Vector (AODV).
Different kinds of attacks were studied, and their effects were
detailed by stating how these attacks disrupt the performance of
MANET. The perceptions of this thesis is to study the effects of
Black hole attack in MANET using both Proactive routing
protocol i.e. Optimized Link State Routing (OLSR) and Reactive
routing protocol Ad-Hoc On Demand Distance Vector
(AODV).The collision of Black Hole attack on the completeness
of ad hoc network is evaluated finding out which protocol is
more effectible to physical to the attack and how much is the
collision of the attack on both protocols. The collection of data
was taken in the light of output, end-to-end desired and network
load. Network simulation is done in Optimized Network
Engineering Tool (OPNET).
Keywords: MANET, Black Hole, Routing Protocol (RP)s
and NS-2 Simulator. |
Cite this article: |
Dr. CHANDRA NAIK M, Dr.G.SAMBASIVA RAO , "
ANALYSIS OF BLACK HOLE ATTACK ON AD HOC NETWORKS USING VARIOUS MOBILE AD HOC NETWORK ROUTING PROTOCOLS " , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),
Volume 6, Issue 2, March - April 2017 , pp.
144-149 , ISSN 2278-6856.
|