International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015


A Trusted Framework for Discovery of Block Hole Attack Over Unsecured Network

Undrakonda Narendra Babu | Bondili Balvinder Singh [2]


Abstract: Mobile ad hoc network (MANET) is a self-configuring network of mobile nodes formed anytime and anywhere without the help of a fixed infrastructure or centralized management. It has many potential applications in disaster relief operations, military network, and commercial environments. Due to open, dynamic, infrastructure-less nature, the ad hoc networks are vulnerable to various attacks. AODV is an important on-demand distance vector routing protocol for mobile ad hoc networks. It is more vulnerable to black hole attack. In MANET, black hole is an attack in which a node shows malicious behaviour by claiming false RREP message to the source node and correspondingly malicious node drops all the receiving packets. In this paper, we have reviewed different techniques to prevent black hole attacks in MANET.


Keywords: AODV, Black Hole, MANET, routing, malicious


Edition: Volume 4 Issue 12, December 2015,


Pages: 122 - 125


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Undrakonda Narendra Babu, Bondili Balvinder Singh, "A Trusted Framework for Discovery of Block Hole Attack Over Unsecured Network", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 122-125, https://www.ijsr.net/get_abstract.php?paper_id=NOV151634

Similar Articles with Keyword 'AODV'

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita [126] | Sunil Makkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty | Manimozhi Iyer

Share this Article
Top