Research Article

Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

Table 2

Effectiveness of attack countermeasures.

AttacksAODVDSRSAODVARANARIADNESEADSAR

Black holeVPVVVVVNV
WormholeVPVVVVVV
Rushing attackVVNVNVNVNVV
Resource depletionVVVVVNVNV
Gray holeVVPVPVNVVNV
SinkholeVVVVVVV
DoSVVVVNVNVV

V: vulnerable.
PV: partially vulnerable.
NV: not vulnerable.