Analysis of Black Hole attack on MANETs Using different MANET routing protocol

ABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the tr...

Full description

Bibliographic Details
Main Authors: Ur-Rehman, Shoaib, Ullah, Irshan
Format: Others
Language:English
Published: Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation 2010
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1151
id ndltd-UPSALLA1-oai-DiVA.org-bth-1151
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-bth-11512018-01-12T05:13:52ZAnalysis of Black Hole attack on MANETs Using different MANET routing protocolengUr-Rehman, ShoaibUllah, IrshanBlekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikationBlekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation2010MANETBlack HoleRouting Protocols.Computer SciencesDatavetenskap (datalogi)TelecommunicationsTelekommunikationABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. The scope of this thesis is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc on Demand Distance Vector (AODV). Comparative analysis of Black Hole attack for both protocols is taken into account. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay and network load. Simulation is done in Optimized Network Engineering Tool (OPNET). Previously the works done on security issues in MANET were based on reactive routing protocol like Ad-Hoc on Demand Distance Vector (AODV). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANET. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:bth-1151Local oai:bth.se:arkivex7A6A4FAF4F35DC07C12577B30030765Dapplication/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic MANET
Black Hole
Routing Protocols.
Computer Sciences
Datavetenskap (datalogi)
Telecommunications
Telekommunikation
spellingShingle MANET
Black Hole
Routing Protocols.
Computer Sciences
Datavetenskap (datalogi)
Telecommunications
Telekommunikation
Ur-Rehman, Shoaib
Ullah, Irshan
Analysis of Black Hole attack on MANETs Using different MANET routing protocol
description ABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. The scope of this thesis is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc on Demand Distance Vector (AODV). Comparative analysis of Black Hole attack for both protocols is taken into account. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay and network load. Simulation is done in Optimized Network Engineering Tool (OPNET). Previously the works done on security issues in MANET were based on reactive routing protocol like Ad-Hoc on Demand Distance Vector (AODV). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANET.
author Ur-Rehman, Shoaib
Ullah, Irshan
author_facet Ur-Rehman, Shoaib
Ullah, Irshan
author_sort Ur-Rehman, Shoaib
title Analysis of Black Hole attack on MANETs Using different MANET routing protocol
title_short Analysis of Black Hole attack on MANETs Using different MANET routing protocol
title_full Analysis of Black Hole attack on MANETs Using different MANET routing protocol
title_fullStr Analysis of Black Hole attack on MANETs Using different MANET routing protocol
title_full_unstemmed Analysis of Black Hole attack on MANETs Using different MANET routing protocol
title_sort analysis of black hole attack on manets using different manet routing protocol
publisher Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation
publishDate 2010
url http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1151
work_keys_str_mv AT urrehmanshoaib analysisofblackholeattackonmanetsusingdifferentmanetroutingprotocol
AT ullahirshan analysisofblackholeattackonmanetsusingdifferentmanetroutingprotocol
_version_ 1718606643673956352