International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 310

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.3 / 10


     

A Trusted Framework for Discovery of Block Hole Attack Over Unsecured Network

Undrakonda Narendra Babu, Bondili Balvinder Singh


Abstract: Mobile ad hoc network (MANET) is a self-configuring network of mobile nodes formed anytime and anywhere without the help of a fixed infrastructure or centralized management. It has many potential applications in disaster relief operations, military network, and commercial environments. Due to open, dynamic, infrastructure-less nature, the ad hoc networks are vulnerable to various attacks. AODV is an important on-demand distance vector routing protocol for mobile ad hoc networks. It is more vulnerable to black hole attack. In MANET, black hole is an attack in which a node shows malicious behaviour by claiming false RREP message to the source node and correspondingly malicious node drops all the receiving packets. In this paper, we have reviewed different techniques to prevent black hole attacks in MANET.


Keywords: AODV, Black Hole, MANET, routing, malicious


Edition: Volume 4 Issue 12, December 2015


Pages: 122 - 125


DOI: https://www.doi.org/10.21275/NOV151634



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Undrakonda Narendra Babu, Bondili Balvinder Singh, "A Trusted Framework for Discovery of Block Hole Attack Over Unsecured Network", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 122-125, https://www.ijsr.net/getabstract.php?paperid=NOV151634, DOI: https://www.doi.org/10.21275/NOV151634



Similar Articles

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 428 - 429

An Approach for Traffic Prediction in SDN for Performing Routing

H. Pavithra, Dr. G. N. Srinivasan

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article



Top