Research Article

Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

Table 1

Vulnerability analysis of routing protocols.

AttacksCountermeasureEffectiveness

Black holeSAREffective
WormholePacket leashesEffective
Rushing attackRAPVersatile
Resource DepletionIDSEffective
Gray holeCheckpoint based multihop ACKVersatile
SinkholeIntruder detectionVersatile
DoSIPS/IDSVersatile

Effective: avoids or allows negligible damage.
Versatile: allows attack only to do a partial damage.
Ineffective: allows the attack to meet out considerable or full damage.