Open Access Open Access  Restricted Access Subscription Access

Averting Techniques of Black-Hole Attack –A Survey


Affiliations
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu, India
 

Objectives: To identify the black-hole attack. The Ad hoc is a self-configuring network it can be configured at anytime and anywhere without pre-defined infrastructure due to unique characteristics. Methods: Black hole is a traffic relaying attack in network layer. The intermediate node involves in forwarding a message to the destination in Multi-hop ad hoc network. These nodes will launch black hole attack to conserve its resource or to perform attacks that reduce the network performance. This attack is carried by the interposed node instead of forwarding the packets this node will carry the action of dropping packets. Findings: We can avoid this attack by using cryptography methods like symmetric encryption, asymmetric encryption and non-cryptography methods like IDS (Intrusion Detection System). This attack can also be avoided by clustering method where we can also reduce the cost. Applications: Many researchers have been carried out for the detection of black hole attack. In this paper we are going to discuss different techniques given for averting the black-hole attack.

Keywords

Adhoc Network, Black Hole, Intrusion Detection System (IDS), RREP, RREQ.
User

Abstract Views: 141

PDF Views: 0




  • Averting Techniques of Black-Hole Attack –A Survey

Abstract Views: 141  |  PDF Views: 0

Authors

P. Pavithra
School of Computing, SASTRA University, Thanjavur, Tamil Nadu, India

Abstract


Objectives: To identify the black-hole attack. The Ad hoc is a self-configuring network it can be configured at anytime and anywhere without pre-defined infrastructure due to unique characteristics. Methods: Black hole is a traffic relaying attack in network layer. The intermediate node involves in forwarding a message to the destination in Multi-hop ad hoc network. These nodes will launch black hole attack to conserve its resource or to perform attacks that reduce the network performance. This attack is carried by the interposed node instead of forwarding the packets this node will carry the action of dropping packets. Findings: We can avoid this attack by using cryptography methods like symmetric encryption, asymmetric encryption and non-cryptography methods like IDS (Intrusion Detection System). This attack can also be avoided by clustering method where we can also reduce the cost. Applications: Many researchers have been carried out for the detection of black hole attack. In this paper we are going to discuss different techniques given for averting the black-hole attack.

Keywords


Adhoc Network, Black Hole, Intrusion Detection System (IDS), RREP, RREQ.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i48%2F139896