A Review on some aspects of Black Hole Attack in MANET
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 10, Issue 8
Abstract
A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack. The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. In this paper we presented a review on few aspects of Black hole attack in MANET’s. We have tried to discuss about the reasons why such attacks are seen in mobile ad- hoc networks and performed an analysis on its performance and result on a few of its simulation parameters.
Authors and Affiliations
Ashis Bhattercharjee , Subrata Paul
A Survey on Feature Selection Using FAST Approach to Reduce High Dimensional Data
Feature selection is a process of identifying the most useful subset of features.The survey summarising most of the feature selection methods and algorithms. Feature selection is the process of identifying a subset of mo...
Relevance Feedback Techniques Implemented in CBIR: Current Trends and Issues
The semantic gap problem and the performance accuracy issues in a Content Based Image Retrieval System (CBIR) can be efficiently overcome by the Relevance Feedback mechanism. Based on this feedback the CBIR system modifi...
A New Paradigm on Experimental Investigation of Concrete for E- Plastic Waste Management
This research paper seeks to optimize the benefits of using E Plastic Waste in the fiber form in concrete. The E Plastic waste (insulation wires) is shredded into fibers of specific size and shape. Several design concret...
Face Recognition using Principle Component Analysis for Biometric Security System
Face recognition is an application area where computer vision research is utilized in both military and commercial products. It is a process of identifying or verifying a person from an image and comparing the se...
Seismic Response of RC Building with Soft Stories
After 26th January 2001, Gujarat Earthquake and other earthquakes in India, there is a nation-wide attention to the seismic vulnerability assessment of existing buildings. The fundamental design concept of earthquake res...