International Journal of Emerging Trends & Technology in Computer Science
A Motivation for Recent Innovation & Research
ISSN 2278-6856
www.ijettcs.org

Call for Paper, Published Articles, Indexing Infromation ANALYSIS OF BLACK HOLE ATTACK ON AD HOC NETWORKS USING VARIOUS MOBILE AD HOC NETWORK ROUTING PROTOCOLS, Authors : Dr. CHANDRA NAIK M, Dr.G.SAMBASIVA RAO, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), www.ijettcs.org
Volume & Issue no: Volume 6, Issue 2, March - April 2017

Title:
ANALYSIS OF BLACK HOLE ATTACK ON AD HOC NETWORKS USING VARIOUS MOBILE AD HOC NETWORK ROUTING PROTOCOLS
Author Name:
Dr. CHANDRA NAIK M, Dr.G.SAMBASIVA RAO
Abstract:
Abstract: In this scenario, ad hoc networks are gaining quality to its peak today, as the users want, an ad hoc connectivity irrespective of their GIS position. If there is more than threat of attacks on the MANETs. Black hole attack is one of the privacy threat in which the traffic is redirected to such a node that actually does not exist in the network. It is an analogy to the black hole in the universe in which things to discontinue to be seen. The host to host presents it in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a privacy way for transmission and communication which is quite challenging and characteristic issue. In order to provide privacy communication and transmission, researcher worked specifically on the privacy issues in ad hoc networks, and many privacy routing protocols and privacy measures within the networks were discussed. Presently the works done on privacy issues in ad hoc network were based on reactive routing protocol like Ad-Hoc On Demand Distance Vector (AODV). Different kinds of attacks were studied, and their effects were detailed by stating how these attacks disrupt the performance of MANET. The perceptions of this thesis is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc On Demand Distance Vector (AODV).The collision of Black Hole attack on the completeness of ad hoc network is evaluated finding out which protocol is more effectible to physical to the attack and how much is the collision of the attack on both protocols. The collection of data was taken in the light of output, end-to-end desired and network load. Network simulation is done in Optimized Network Engineering Tool (OPNET). Keywords: MANET, Black Hole, Routing Protocol (RP)s and NS-2 Simulator.
Cite this article:
Dr. CHANDRA NAIK M, Dr.G.SAMBASIVA RAO , " ANALYSIS OF BLACK HOLE ATTACK ON AD HOC NETWORKS USING VARIOUS MOBILE AD HOC NETWORK ROUTING PROTOCOLS " , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 6, Issue 2, March - April 2017 , pp. 144-149 , ISSN 2278-6856.
Full Text [PDF]                          Home