A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL

Abstract

MANET are gaining popularity now days due to flexibility and communication without the infrastructure or centralized access point. The dynamic changing nature of network topology makes any node in MANET to leave and join the network at any point of time. From a security design perspective, MANETs have no clear line of defense; i.e. no in -bulit security. Thus MANET is accessible to both legitimate network users and malicious attackers. There are many routing attacks caused due to lack of security .The one of most suitable protocol is AODV for Ad-hoc networks and it is vulnerable to black hole attack by malicious nodes. It is similar to the black hole in the universe in which things disappear. The Black hole attack is that where a malicious node advertises itself as it is having the optimal route to the destination by sending RREP message with highest sequence number and minimum hop count.In this paper, a review of different types of attacks and existing solutions to detect black hole attack and their demerits

Authors and Affiliations

Er. Kiran Narang , Ms. Sonal

Keywords

Related Articles

Solving Digital Circuit Layout Problem based on Graph Partitioning Technique: A Glance 

—Digital Circuit Layout is a combinatorial optimization problem. Due to the complexity of integrated circuits, the first step in physical design is usually to divide a design into subdesigns. The work presents a br...

Morphological Processor for Inflectional Case of Multipurpose Lexico-Conceptual Knowledge Resource  

Myanmar language is morphologically rich and agglutinative language. Myanmar words are postpositionally inflected with various grammatical features which can cause difficulties for Language Acquisition (LA). LA is...

Optical Character Recognition Using Artificial Neural Network  

— In this paper, an Optical Character recognition system based on Artificial Neural Networks (ANNs). The ANN is trained using the Back Propagation algorithm. In the proposed system, each typed English letter is rep...

Automatic Boundary Detection and Generation of Region of Interest for Focal Liver Lesion Ultrasound Image Using Texture Analysis

The analysis of texture parameters is a useful way of increasing the information obtainable from medical images. It is an on-going field of research, with applications ranging from the segmentation of specific anatomical...

“AUTO MONITORING OF APPLIANCES BY INTERNET”  

Under the heading it is abbreviated as ―Networked home appliance system using Bluetooth technology integrating appliance control/monitoring with Internet service‖ Here the monitoring and controlling of home appliance...

Download PDF file
  • EP ID EP146584
  • DOI -
  • Views 51
  • Downloads 0

How To Cite

Er. Kiran Narang, Ms. Sonal (2013). A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(4), 1601-1606. https://europub.co.uk/articles/-A-146584