International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Views: 247

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.2 / 10


     

A Survey on Different Existing Technique for Detection of Black Hole Attack in MANETs

Heta Changela, Amit Lathigara


Abstract: Mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network. In which mobile devices are connected directly without wires. Communication will occur between nodes directly or through intermediate nodes. The node is acting as a host and router both, it will communicate with each other through multi-hops due to limited transmission ranges. MANETs vulnerable to various attacks including Black Hole attack. The black hole attack is present at network layer. Black hole is an attack in which malicious node Incorrectly due itself as a valid node. It will receive the information and it will not forward the information to next nodes. This paper presents a review of various techniques used to detect and prevent the black hole attack in AODV routing protocol.


Keywords: MANET, black hole attack, detection and prevention techniques, AODV


Edition: Volume 4 Issue 1, January 2015


Pages: 415 - 419



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Heta Changela, Amit Lathigara, "A Survey on Different Existing Technique for Detection of Black Hole Attack in MANETs", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 415-419, https://www.ijsr.net/getabstract.php?paperid=SUB15151, DOI: https://www.doi.org/10.21275/SUB15151



Similar Articles

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 736 - 741

Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks

Dr. J. Seetaram, Dr. M. Nagaraju Naik

Share this Article

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article
Top