Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols

Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redir...

Full description

Bibliographic Details
Main Authors: ULLAH, IRSHAD, REHMAN, SHOAIB UR
Format: Others
Language:English
Published: Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation 2010
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2505
id ndltd-UPSALLA1-oai-DiVA.org-bth-2505
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-bth-25052018-01-12T05:14:17ZAnalysis of Black Hole Attack on MANETs Using Different MANET Routing ProtocolsengULLAH, IRSHADREHMAN, SHOAIB URBlekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikationBlekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation2010MANETBlack HoleRouting ProtocolsComputer SciencesDatavetenskap (datalogi)TelecommunicationsTelekommunikationWireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. Previously the works done on security issues in MANET were based on reactive routing protocol like Ad-Hoc On Demand Distance Vector (AODV). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANET. The scope of this thesis is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc On Demand Distance Vector (AODV). Comparative analysis of Black Hole attack for both protocols is taken into account. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay and network load. Simulation is done in Optimized Network Engineering Tool (OPNET). Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:bth-2505Local oai:bth.se:arkivex448194BA63F382FDC1257751006226B8application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic MANET
Black Hole
Routing Protocols
Computer Sciences
Datavetenskap (datalogi)
Telecommunications
Telekommunikation
spellingShingle MANET
Black Hole
Routing Protocols
Computer Sciences
Datavetenskap (datalogi)
Telecommunications
Telekommunikation
ULLAH, IRSHAD
REHMAN, SHOAIB UR
Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols
description Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. Previously the works done on security issues in MANET were based on reactive routing protocol like Ad-Hoc On Demand Distance Vector (AODV). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANET. The scope of this thesis is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc On Demand Distance Vector (AODV). Comparative analysis of Black Hole attack for both protocols is taken into account. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay and network load. Simulation is done in Optimized Network Engineering Tool (OPNET).
author ULLAH, IRSHAD
REHMAN, SHOAIB UR
author_facet ULLAH, IRSHAD
REHMAN, SHOAIB UR
author_sort ULLAH, IRSHAD
title Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols
title_short Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols
title_full Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols
title_fullStr Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols
title_full_unstemmed Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols
title_sort analysis of black hole attack on manets using different manet routing protocols
publisher Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation
publishDate 2010
url http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2505
work_keys_str_mv AT ullahirshad analysisofblackholeattackonmanetsusingdifferentmanetroutingprotocols
AT rehmanshoaibur analysisofblackholeattackonmanetsusingdifferentmanetroutingprotocols
_version_ 1718606734986051584