International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 266

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013 | Popularity: 6.2 / 10


     

Detection and Mitigation Techniques of Black Hole Attack in MANET: An Overview

Swati Jain, Naveen Hemrajani


Abstract: As the increase of wireless networks, use of mobile phones, smart devices are gaining popularity so the adhoc network is also an uprising field. Each device in a MANET is free to move independently in any direction, linking to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, and quality of service, limited bandwidth and limited power supply etc. This paper describes the features, application, and vulnerabilities of mobile ad hoc network also presents an overview and the study of the attacks and their mitigation in routing protocols


Keywords: MANET, Wireless Networks, Ad hoc Networking, Routing Protocol


Edition: Volume 2 Issue 5, May 2013


Pages: 70 - 73



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Swati Jain, Naveen Hemrajani, "Detection and Mitigation Techniques of Black Hole Attack in MANET: An Overview", International Journal of Science and Research (IJSR), Volume 2 Issue 5, May 2013, pp. 70-73, https://www.ijsr.net/getabstract.php?paperid=IJSRON2013943, DOI: https://www.doi.org/10.21275/IJSRON2013943



Similar Articles

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 734 - 741

Enhanced Congestion Control in Wireless Networks: A Joint Random Early Detection and Drop Tail Mechanism

S. Mohanarangan, R. Kalaivani Sri, P. Nithya, M. Sowndharya, M. Hemamalini

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 736 - 741

Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks

Dr. J. Seetaram, Dr. M. Nagaraju Naik

Share this Article
Top