Research paper on black hole attack

Thus the attacker may come to know the confidential information that is being transferred through the channel in the. On the other hand in active attack the attacker can destroy, drop, and modify the original data. Black hole attack is one of the important attacks which is responsible for packet dropping that leads to packet loss.

In black hole attack [6, 7, 8] the intermediate nodes initially behaves normally. Thus according to the traditional AODV routing protocol a high sequence number is also assigned to this node.

Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks

Thus this node actively takes part in route discovery process of AODV routing. Thus the route is also established through this node. The source and the destination seem that the actual route is established, so they start to transmit the data. But then these malicious nodes deny forwarding the packet.

This node swallows the packet. Thus the packets are dropped here rather than forwarding it to its original destination.

  1. Effect of Single and Cooperative Black Hole Attack in MANET using OLSR protocol;
  2. essay on acid rain and its effects.
  3. An Artificial Intelligence Technique for Prevent Black Hole Attacks in MANET | SpringerLink.
  4. what should the thesis statement of a book review look like.
  5. black hole attack research papers .

This corresponding node is known as black hole node and this effect is the black hole attack. Obviously this black hole attack degrades the Quality of Service in terms of packet dropping.


There are several techniques proposed by the researchers to handle this problem. Trust based routing is one of the widely accepted techniques. The rest of the paper is organized as follows. Section 2 deals with the proposed work. Results and performances are discussed in section 3. Conclusions are drawn in section 4 and references are given at end. The selection of more trusted route become an important aspect of Ad-hoc network. To provide a trust based routing protocol several trust evaluation models are proposed by various researchers. But it suffers from some assumptions, which a node may need to recover from its neighbor node.

Mangrulkar, Pallavi V Chavan, S. Then after transferring a packet from one node to another node this trust value is increased to In this method a higher trust value is assigned when a node forward a packet. And this method is not so strong to detect a black hole node and to exclude it from its route. In this paper the trust value of a node is calculated depending upon the packet forwarding ability and a weight factor.

This trust value is inserted in the routing table and the route discovery is done according to this trust value by avoiding a less trusted node. In the proposed work a new parameter known as 'trust value' is calculated against all the intermediate nodes.

This trust value is calculated depending upon the ability to forward packets and the RREQ forwarding ability of a node. To obtain this ability the number of packets received and the number of packet sent is counted. Two weight factor W1 and W2 are introduced. W1 is the ratio of number of packets sent from a node to the number of packets received to that node. A high value of this ratio indicates that, the node has a greater ability to forward the packets. Thus the probability of loss of packets is less. The maximum value of W1 may be 1, where all the received packets are forwarded and no packet is dropped.

  1. informative essay serial killers;
  2. essay slavery cause civil war;
  3. linear regression research paper.
  4. Nav view search;

From this value we can also detect the untrusted nodes in the network. This ratio detects the nodes which continuously receive the RREQ from its neighbour nodes but never respond to that request by sending the reply i. Thus the higher value of this ratio means that, the nodes can frequently respond to the route request of its neighbour node. Then this two weight factor is multiplied to get the trust value of that node. Here we check if any nodes have the W1 value greater than the threshold value. If it can send a packet then the trust value is increased otherwise it is decreased.

This trust value is saved in the routing table of that node.

Viewing options

And in the route discovery step of AODV routing protocol the path is established according to that trust value rather than the shortest path. Before Noon 9am to 1pm After Noon 2pm to 5pm. Please leave this field empty. Member Name. Skip to content. This paper is published in Volume-3, Issue-1, Volume-3, Issue-1, Give proper credits, use Citation. As MANETs are mobile in nature, they use wireless connections to connect various networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security attacks.

A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the shortest path to the destination node in response to a route request message.

Effect of Single and Cooperative Black Hole Attack in MANET using OLSR protocol

Our mechanism helps to protect the network by detecting and reacting to malicious activities of any node. This is a preview of subscription content, log in to check access. Tseng, F. Burbank, J. Perkins, C. Edelkamp, S. Chen, W. Tamilselvan, L. Kurosawa, S. Zhang, X. In: Proceeding of Mobicom Conference, pp.