A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
MANET are gaining popularity now days due to flexibility and communication without the infrastructure or centralized access point. The dynamic changing nature of network topology makes any node in MANET to leave and join the network at any point of time. From a security design perspective, MANETs have no clear line of defense; i.e. no in -bulit security. Thus MANET is accessible to both legitimate network users and malicious attackers. There are many routing attacks caused due to lack of security .The one of most suitable protocol is AODV for Ad-hoc networks and it is vulnerable to black hole attack by malicious nodes. It is similar to the black hole in the universe in which things disappear. The Black hole attack is that where a malicious node advertises itself as it is having the optimal route to the destination by sending RREP message with highest sequence number and minimum hop count.In this paper, a review of different types of attacks and existing solutions to detect black hole attack and their demerits
Authors and Affiliations
Er. Kiran Narang , Ms. Sonal
Solving Digital Circuit Layout Problem based on Graph Partitioning Technique: A Glance
—Digital Circuit Layout is a combinatorial optimization problem. Due to the complexity of integrated circuits, the first step in physical design is usually to divide a design into subdesigns. The work presents a br...
Morphological Processor for Inflectional Case of Multipurpose Lexico-Conceptual Knowledge Resource
Myanmar language is morphologically rich and agglutinative language. Myanmar words are postpositionally inflected with various grammatical features which can cause difficulties for Language Acquisition (LA). LA is...
Optical Character Recognition Using Artificial Neural Network
— In this paper, an Optical Character recognition system based on Artificial Neural Networks (ANNs). The ANN is trained using the Back Propagation algorithm. In the proposed system, each typed English letter is rep...
Automatic Boundary Detection and Generation of Region of Interest for Focal Liver Lesion Ultrasound Image Using Texture Analysis
The analysis of texture parameters is a useful way of increasing the information obtainable from medical images. It is an on-going field of research, with applications ranging from the segmentation of specific anatomical...
“AUTO MONITORING OF APPLIANCES BY INTERNET”
Under the heading it is abbreviated as ―Networked home appliance system using Bluetooth technology integrating appliance control/monitoring with Internet service‖ Here the monitoring and controlling of home appliance...