A REVIEW ON VARIOUS TECHNIQUES FOR BLACK HOLE ATTACK DETECTION AND PREVENTION

Abstract

In recent years mobile Adhoc network features a nice impact on wireless networks. In MANET, each node acts as a router to ascertain a route and transfer information by means that of multiple hops. Manet square measure a lot of susceptible to security problem. Once a node desires to transfer information to a different node, packets square measure transferred through the intermediate no des, thus, searching and establishing a route from a supply node to a destination node is a vital task in MANETs. Routing is an important part in Manet and its many routing protocols. Circumstantial On - demand Distance Vector (AODV) is one in all the foremo st appropriate routing protocol for the MANETs and it's a lot of susceptible to region attack by the malicious nodes. A malicious node that incorrectly sends the RREP (route reply) that it's a modern route with minimum hop count to destination so it drops all the receiving packets this is often referred to as as region attack within the case of multiple malicious nodes that employment in conjunction with cooperatively, the impact are a lot of this sort of attack is known as cooperative region attack. There square measure numerous efforts are created to defend against region attack, but none of the answer appearance most promising to defend against region attack. Thus during this paper, we've got surveyed and compared the present solutions to region attacks o n AODV protocol.

Authors and Affiliations

Mandeep Singh , Ashu

Keywords

Related Articles

 VIRTUAL MACHINE PLACEMENT AND LOAD REBALANCING ALGORITHMS IN CLOUD COMPUTING SYSTEMS

 The goal of virtual machine placement in cloud environment is to provide better service to the cloud users, and also the effective use of available resources. In this paper a review of various algorithms has b...

Corrosion Behaviour of Mild Steel in Acidic Medium in Presence of Aqueous Extract of Clitoria Ternatea Stem

The corrosion inhibitive action of flower extracts of clitoria ternatea stem on mild steel corrosion in 0.5 M H2SO4 solution was studied using weight loss method, potentiodynamic polarization and EIS measurements. The...

Rainfall and Runoff Process Using By Overla

The integration strategy for a watershed can be carried out by various procedures. However a first step is usually a resource survey or inventory. This attempts to answer the question of the supply and demand for resour...

 STUDY OF MAXIMUM POWER POINT TRACKING(MPPT) IN SOLAR PV ARRAY SYSTEM

 The problem being solved using maximum power point tracking MPPT techniques is to find the voltage VMPP or current IMPP at which a photovoltaic module should operate to obtain the maximum power output PMAX under a...

 OGEDIDS: OPPOSITIONAL GENETIC PROGRAMMING ENSEMBLE FOR DISTRIBUTED INTRUSION DETECTION SYSTEMS

 Due to the wide range application of internet and computer networks, the securing of information is indispensable one. In order to secure the information system more effectively, various distributed intrusion detec...

Download PDF file
  • EP ID EP95211
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Mandeep Singh, Ashu (30). A REVIEW ON VARIOUS TECHNIQUES FOR BLACK HOLE ATTACK DETECTION AND PREVENTION. International Journal of Engineering Sciences & Research Technology, 4(6), 973-977. https://europub.co.uk/articles/-A-95211