CFP last date
20 May 2024
Reseach Article

AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack

by Sanjay Singh, Deepak Choudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 172 - Number 9
Year of Publication: 2017
Authors: Sanjay Singh, Deepak Choudhary
10.5120/ijca2017915208

Sanjay Singh, Deepak Choudhary . AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack. International Journal of Computer Applications. 172, 9 ( Aug 2017), 30-34. DOI=10.5120/ijca2017915208

@article{ 10.5120/ijca2017915208,
author = { Sanjay Singh, Deepak Choudhary },
title = { AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 172 },
number = { 9 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume172/number9/28281-2017915208/ },
doi = { 10.5120/ijca2017915208 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:19:54.817397+05:30
%A Sanjay Singh
%A Deepak Choudhary
%T AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 172
%N 9
%P 30-34
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A MANET (Mobile Ad-Hoc Network) is a temporary network consisting of wireless mobile nodes having no centralized administration and access point. An efficient and dynamic routing protocol is needed that can adapt to dynamically changing network topology and should be energy efficient and bandwidth efficient. But these protocols are not suitable due to resource constraints. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). One of these attacks is Black Hole Attack, which grasps all data packets of network. It’s an analogy to the black hole in the universe in which things disappear. In this paper Ad-Hoc On Demand Distance Vector(AODV) and Optimized Link State Routing((OLSR) protocols are analyzed to validate which protocol is more vulnerable to Black hole attack and how much. The impact of Black hole attack on the performance of Manet is evaluated on the basis of throughput and end to end delay and it was observed that AODV is more susceptible to attack than OLSR. The measurements were carried on Simulating in Network Simulation Tool (NS2).

References
  1. Rakhi Purohit, Hari Singh Choudhary, Vikas Choudhary “ Performance Evaluation of Ad Hoc Routing protocols with NS2 “ IJCSET, January 2012, Vol 2, Issue 1, 787-791
  2. C.M barushimana, A.Shahrabi, “Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad-Hoc Networks”, Workshop on Advance Information Networking and Application, Vol. 2, pp. 679-684, May, 2003.
  3. C.Jiwen, Y.Ping, C.Jialin, W.Zhiyang, L.Ning, “ An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network”,24th IEEE International Conference on Advance Information Networking and Application (AINA 2010), pp. 775-780, April,2010.
  4. Akshay Kansra, Ankur Sehgal, “ Improvement of Black Hole Detection Technique in Wireless Sensor Network”,IJEDR, Vol. 4,Isue 3, ISSN:2321-9939.
  5. C.Parkins, E.B.Royer, S.Das, A hoc On-Demand Distance Vector (AODV) Routing. July 2003, [Online]. Available: http://www.faqs.org/rfcs/rfc3561.html. [Accessed: April. 10, 2010]
  6. M.Abolhasan, T.Wysocki, E.Dutkiewicz, “A Review of Routing Protocols for Mobile Ad-Hoc Networks”, Telecommunication and Information Research Institute University of Wollongong, Australia, June, 2003.
  7. T. Clausen, P.Jacquet , “Optimized Link State Routing Protocol (OLSR)”, RFC 3626 October, 2003.
  8. P. V. Jani, “Security within Ad-Hoc Networks”, Position Paper, PAMPAS Workshop, Sept. 2002.
  9. Jasmeen Kaur, Tanupreet Singh, “Enhanced Proactive Secret Sharing Scheme to Prevent Black Hole Attacks in MANETs”, International Journal of Computer Applications (0975-8887), Volume 119-No 10, June 2015.
  10. S.Marti, T.J.Giuli, K.Lai, M.Baker, “Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks”, Proceedings of the 6th annual international conference on Mobile computing and networking, united states, pp. 255-265,
  11. Zhu, C. Lee, M.J.Saadawi, T., “RTT-Based Optimal Waiting time for Best Route Selection in Ad-Hoc Routing Protocols”, IEEE Military Communications Conference, Vol. 2, pp. 1054-1059, Oct, 2003.
  12. V. Mahajan, M. Natue and A. Sethi, “Analysis of Wormhole Intrusion attacks in MANETs”, IEEE Military Communications Conference, pp. 1-7, Nov, 2008.
  13. H.Deng, W.Li and D.P.Agrawal, “Routing Security in Wireless Ad-Hoc Networks”, University of Cincinnati, IEEE Communication Magazine, Oct, 2002.
  14. Konagala Pavani andDamodaram Avula, “Performance of Mobile Adhoc Networks in Presence of Attacks”, International Conference on Information Secuity and Artificial Intelligence (ISAI 2012), 2012 vol.56 (2012), IACSIT Press Singapore.
  15. Anjali Joy and Sijo Cherian, “Black Hole Attack and its Mitigation Techniques in OLSR and AODV”, IJCSET , ISSN:2229-2245, Vol 4 No. 06, 2013
  16. M. Al-Shurman, S-M. Yoo, and S. Park, “Black Hole Attack in Mobile Ad-Hoc Networks”, ACM Southeast Regional Conf. 2004.
  17. H. Deng, W. Li, Agrawal, D.P., “Routing security in wireless Ad-Hoc networks”, Cincinnati Univ.,OH, USA; IEEE Communications Magazine, , Vol.40, pp.70- 75, ISSN: 0163-6804, Oct. 2002.
  18. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding Royer, “Secure routing protocol for Ad-Hoc networks”, In Proc. of 10th IEEE International Conference on Network Protocols, Dept. of Computer Science, California Univ., Santa Barbara, CA, USA. pp.78- 87, ISSN: 1092-1648, Nov. 2002.
  19. S.Sharma, Rajshree, R.P.Pandey, V.Shukla, “Bluff-Probe Based Black Hole Node Detection and Prevention”, IEEE International Advance Computing Conference (IACC 2009), pp. 458-462, March, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Black Hole Routing Protocols