International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 226

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.2 / 10


     

A Survey of Reactive Routing Protocols for Detection & Prevention of Selective Black-hole Attack in MANET

Mithun S, A Thomas Paul Roy, Dr. K.Balasubadra


Abstract: Black-hole attack in MANET refers to a Network layer attack. In networking, black holes refer to places in the network where incoming or outgoing traffic is silently discarded (or dropped), without informing the source that the data did not reach its intended recipient. In fact wireless network doesnt have a fixed topology, the black holes themselves are invisible, and can only be detected by monitoring the lost traffic; hence the name. We present a comparison between Conventional Reactive Routing Protocols (DSR, AODV) with a Modified Approach to Analyze the Performance in the Presence of selective black hole attack. Performance Analysis of these protocols can be verified using ns2 simulator.


Keywords: MANET, security, intrusion-detection, black-hole


Edition: Volume 3 Issue 11, November 2014


Pages: 2411 - 2414



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Mithun S, A Thomas Paul Roy, Dr. K.Balasubadra, "A Survey of Reactive Routing Protocols for Detection & Prevention of Selective Black-hole Attack in MANET", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2411-2414, https://www.ijsr.net/getabstract.php?paperid=OCT141572, DOI: https://www.doi.org/10.21275/OCT141572



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article
Top