A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 2
Abstract
The interest in the field of Mobile Ad hoc Network (MANET) is growing since last few years because of its practical applications in mobile devices. MANET is particularly vulnerable to security attacks in comparison to wired network or infrastructure-based wireless network due to its fundamental characteristics such as the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. In order to provide secure and good communication and transmission, researchers have worked specifically on the security issues in MANETs and many secure routing protocols and security measures were proposed. The black hole attack is one of the most prominent security threats which disrupt the routing in Mobile Networks. The scope of this work is to understand the effects of Black hole attack in MANET and devise a strategy to mitigate the attack for Ad-Hoc on Demand Distance Vector (AODV) Routing Protocol in MANETs.
Authors and Affiliations
Biswaraj Sen
COMPARATIVE STUDY AND NEW APPROACH MULTI CLASSIFIERS: APPLICATION TO THE RECOGNITION OF ARABIC NUMERALS
Generally, most of the problems of recognition are due to the classification of the feature vectors, or to the mismatch between learning conditions and test, so to improve the robustness of the existing recognitio...
Removal of Pb2+, Cu2+ and Cd2+ Metals from Simulated Wastewater in Single and Competitive System Using Locally Porcelanite
The equilibrium uptake of lead (Pb2+), copper (Cu2+) and cadmium (Cd2+) ions, both singly and in combination, by locally Iraqi porcelanite rocks (PC) was studied in a batch system. The porcelanite rock was charac...
IMPLEMENTATION OF LOW POWER AND LESS AREA BOOTH MULTIPLIER
Multiplication in hardware can be implemented in two ways either by using more hardware for achieving fast execution or by using less hardware and end up with slow execution. The area and power of the multiplier is...
3-Level Neutral-Point Clamped Inverters Using Multi Carrier Pulse Width Modulation for FACTS Applications
In this paper, a novel technique used to keep the voltage across the dc split capacitors of neutral point clamped inverter using multi carrier pulse width modulation and also compensate the reactive power. It can...
A Comparison of Outlier Detection Algorithm for Wireless Sensor Network
Wireless sensor networks had been deployed in the real world to collect large amounts of raw sensed data. However, the key challenge is to extract high level knowledge from such raw data. Sensor networks applicati...