A REVIEW ON VARIOUS TECHNIQUES FOR BLACK HOLE ATTACK DETECTION AND PREVENTION

Abstract

In recent years mobile Adhoc network features a nice impact on wireless networks. In MANET, each node acts as a router to ascertain a route and transfer information by means that of multiple hops. Manet square measure a lot of susceptible to security problem. Once a node desires to transfer information to a different node, packets square measure transferred through the intermediate no des, thus, searching and establishing a route from a supply node to a destination node is a vital task in MANETs. Routing is an important part in Manet and its many routing protocols. Circumstantial On - demand Distance Vector (AODV) is one in all the foremo st appropriate routing protocol for the MANETs and it's a lot of susceptible to region attack by the malicious nodes. A malicious node that incorrectly sends the RREP (route reply) that it's a modern route with minimum hop count to destination so it drops all the receiving packets this is often referred to as as region attack within the case of multiple malicious nodes that employment in conjunction with cooperatively, the impact are a lot of this sort of attack is known as cooperative region attack. There square measure numerous efforts are created to defend against region attack, but none of the answer appearance most promising to defend against region attack. Thus during this paper, we've got surveyed and compared the present solutions to region attacks o n AODV protocol.

Authors and Affiliations

Mandeep Singh , Ashu

Keywords

Related Articles

 A Review of Production of Ethanol from Corn

 Ethanol production is being done from many sugar and starch crops, out of which maize plant seems to be commonly used. Parts of the maize plant like its stalk, cobs, kernelsetc have been put to use for the extract...

 INVESTIGATION OF ERGONOMICS DESIGN FOR THE VEHICLE DOOR HANDLE FOR PROTON (BLM) AND PERODUA (VIVA)

 Automotive ergonomics is the study of how automotive can be designed better for human use. The human factor aspect of designing automobile is first considered in designing good door handle. This study is to correl...

 Stability analysis of linear contraints nonholonomic systems based on conserved quantity

  In this paper, we derive the augmented Birkhoff equation of linear contraints nonholonomic systems firstly. Base on a conserved quantity or a combination of some conserved quantities, we study the stability of l...

 Sleepy Keeper Approach for Common Source CMOS Amplifier for Low-Leakage Power VLSI Design

 As the scaling goes deep into nano-meter range the leakage power dissipation has overtaken the dynamic power dissipation in VLSI circuits. The demand for low power consumer electronic gadgets which are portable re...

COMPARATIVE ANALYSIS OF 64-BIT DIFFERENT SRAM CELL USING 180NM TECHNOLOGY

With ever raising demands of battery operated portable device in market is encouraging the VLSI makers to reduce the power dissipation of the electronics devices so that battery backup can be increased. Static Random Ac...

Download PDF file
  • EP ID EP95211
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Mandeep Singh, Ashu (30). A REVIEW ON VARIOUS TECHNIQUES FOR BLACK HOLE ATTACK DETECTION AND PREVENTION. International Journal of Engineering Sciences & Research Technology, 4(6), 973-977. https://europub.co.uk/articles/-A-95211