A Review Study on Preventing and Detecting Technique of Black Hole Attack in MANET
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2017, Vol 1, Issue 4
Abstract
There are basically two types of black hole attack i.e. internal black hole and External black hole attack. Black hole is a malicious node that wrongly replies for some route requests without having active route to particular destination and drop all the getting packets. If these malicious nodes work jointly as a collection then the damage will be very risky. This type of attack is called cooperative black hole attack. Black hole attack is a type of active attack. Black hole attack can arise when the malicious node on the path attack the data transfer and purposely drop, delay or change the data transfer passing through it. Black hole node treats itself as a trusted node. This is review study on Black hole node send false routing information, claim that it has a best route and cause additional good nodes to route data packets through the black hole node. Kavita Babriya | Surender Singh"A Review Study on Preventing and Detecting Technique of Black Hole Attack in MANET" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd129.pdf http://www.ijtsrd.com/engineering/computer-engineering/129/a-review-study-on-preventing-and-detecting-technique-of-black-hole-attack-in-manet/kavita-babriya
Keylogger for Windows using Python
The proposed point Keylogger which is likewise called as keystroke logger is a product that tracks or logs the key struck on your console, regularly in a mystery way that you have no clue about that your activities are b...
Smart Door Access using Facial Recognition
Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The paper presents a methodology for face recognition based on information theory approach of coding...
Development of Wavelet Based Image Denoising
In miscellaneous facsimile processing and computer vision issues, the Facsimile Demosaicing is an appropriate challenge. We have used SOMA and wavelet shrinkage for facsimile Demosaicing. Selection of customary Demosaici...
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
As a significant application in distributed computing, distributed storage offers client adaptable, adaptable and top notch information stockpiling and calculation administrations. A developing number of information prop...
To Evaluate the Efficacy of Arkaksheradi Lepa after Prachanna in Shwitra A Single Case Study
Skin is the largest organ which covers body. Vata and Bhrajaka pitta are responsible for maintaining healthy skin. Shwitra is one among the Kilasa kushta which is characterized by the manifestation of Swetha Mandala and...