A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 2
Abstract
The interest in the field of Mobile Ad hoc Network (MANET) is growing since last few years because of its practical applications in mobile devices. MANET is particularly vulnerable to security attacks in comparison to wired network or infrastructure-based wireless network due to its fundamental characteristics such as the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. In order to provide secure and good communication and transmission, researchers have worked specifically on the security issues in MANETs and many secure routing protocols and security measures were proposed. The black hole attack is one of the most prominent security threats which disrupt the routing in Mobile Networks. The scope of this work is to understand the effects of Black hole attack in MANET and devise a strategy to mitigate the attack for Ad-Hoc on Demand Distance Vector (AODV) Routing Protocol in MANETs.
Authors and Affiliations
Biswaraj Sen
OPTIMISED SECURITY FRAMEWORK BASED ON TIME STAMP FOR DOS ATTACKS IN WIRELESS SENSOR NETWORKS
Network performance always dependent on the perfect flow of the data processing packets in network but with attacks in network, performance halted a lot or just degraded at times. Denial of service attack is one o...
POWER OBLIGATION WITH FEMTOCELL FOR LTE NETWORKS
Femtocells are relied upon to build system limit, broaden full scale cell scope, and present new administrations. Since Femtocells offer the same recurrence band with full scale cells much of the time, the femtocell Bas...
Adsorption Studies of Nitrate on Activated Carbon derived from Helianthus Annuus
The present study deals with removal of nitrate from aqueous solution using low cost activated carbon prepared from helianthus annuus cob. In adsorption solute present in dilute concentration in liquid or gas phas...
Information Capacity and BER Improvement Using Haar Transform in DWT-CDMA Water Marking Based on Pseudorandom Sub Space Projection
In this paper we remove the host image correlation with the a orthogonal sequence during extracting phase is proposed in high capacity CDMA watermarking which improves the BER, message capacity, and robustness of...
ASSESSEMENT OF COLOR FASTNESS OF LINEN FABRIC DYED BY TEA SUBSTANCE WITH AN ECO-DESIGN APPROACH
Nowadays, textile products have found a wide range of application in apparel, domestic and industrial area. The applications include not only clothing and accessories, bedding and interior decoration, but also textile s...