A REVIEW ON VARIOUS TECHNIQUES FOR BLACK HOLE ATTACK DETECTION AND PREVENTION

Abstract

In recent years mobile Adhoc network features a nice impact on wireless networks. In MANET, each node acts as a router to ascertain a route and transfer information by means that of multiple hops. Manet square measure a lot of susceptible to security problem. Once a node desires to transfer information to a different node, packets square measure transferred through the intermediate no des, thus, searching and establishing a route from a supply node to a destination node is a vital task in MANETs. Routing is an important part in Manet and its many routing protocols. Circumstantial On - demand Distance Vector (AODV) is one in all the foremo st appropriate routing protocol for the MANETs and it's a lot of susceptible to region attack by the malicious nodes. A malicious node that incorrectly sends the RREP (route reply) that it's a modern route with minimum hop count to destination so it drops all the receiving packets this is often referred to as as region attack within the case of multiple malicious nodes that employment in conjunction with cooperatively, the impact are a lot of this sort of attack is known as cooperative region attack. There square measure numerous efforts are created to defend against region attack, but none of the answer appearance most promising to defend against region attack. Thus during this paper, we've got surveyed and compared the present solutions to region attacks o n AODV protocol.

Authors and Affiliations

Mandeep Singh , Ashu

Keywords

Related Articles

 Variation of Strength of OPC-Rice Husk Ash Cement Composites with WaterCement Ratio

 This work investigated the variation of strength of OPC-RHA cement composites with water-cement ratio. 180 concrete cubes of 150mm x 150mm x 150mmwere produced with OPC and RHA using a constant mix ratio of 1:2:4...

Indoor UWB Communication System Model

In this paper we have realized UWB (Ultra –wide band) communication system by modelling UWB signal as Gaussian and its derivatives and convolving them with the IEEE 802.15.3a channel models for LOS and different NLOS c...

 KINETICS OF BIOGAS GENERATION USING DOMESTIC WASTES AS FEEDSTOCK

 Anaerobically, biogas was generated from decayed organic substances through fermentation induced by microbial activities in the bio-reactor. This study reports a pilot project on the kinetics of the biogas produce...

EFFECT OF IDOLS IMMERSION ON ANTHROPOGENIC INFLUENCED RITUAL PONDS WATER QUALITY AT HOLY CITY VARANASI

Many ponds of holy city Varanasi are polluted by anthropogenic activities. This is due to improper management of public and private sector. There is some religious importance of ponds in Varanasi. The concept is based o...

 Augmenting the Protection of Data in International Data Encryption Algorithm (Idea) By Increasing Steps of Operation

 As the transmission of data over internet is increasing; the protection issues of data are increasing as well. In order to protect the data and to secure it against intruders, there is a need of such systems which...

Download PDF file
  • EP ID EP95211
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Mandeep Singh, Ashu (30). A REVIEW ON VARIOUS TECHNIQUES FOR BLACK HOLE ATTACK DETECTION AND PREVENTION. International Journal of Engineering Sciences & Research Technology, 4(6), 973-977. https://europub.co.uk/articles/-A-95211