A Survey on Black Hole Attack Detection and Prevention Techniques
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Mobile Ad Hoc Network can be defined as a system of self governing, independent mobile nodes that communicate over wireless links with no fixed infrastructure. Due to its fundamental characteristics like lack of fixed infrastructure, dynamic topology and wireless nature, MANET faces various security issues. One such security issue is Black Hole Attack. In this attack, malicious node pretends itself as a node having shortest path from source to destination. As a result, source node decides to transmit data through malicious node and then malicious node decides whether to forward or drop the packet sent by sender. So, to provide secure transmission against Black Hole Attack, researchers from time to time proposed different security measures and routing protocols. This paper summarizes and compares the work done by some of these researchers.
Authors and Affiliations
Neha, Manmohan Sharma
Hazard Identification and Assessment for Floating, Production, Storage and Offloading Unit in Offshore Oil Industry
Floating Production Storage and Offloading Systems (FPSO) are large vessels or ships often equipped with processing facilities and moored to the location for a shorter or longer period of time. The key feature of the sh...
slugPerformance Improvement of Vacuum Pump Through CFD Analysis
In this study, water ring vacuum pump was numerically simulated and compared with experimentally measured data .To improve the efficiency of SUVAC V20 water ring vacuum pump, Computational Fluid Dynamics analysis is one...
ߜመ ࣓Closed Sets in Ideal Topological Space
In this paper the notion of ࣓ࢾclosed sets is introduced and some of its basic properties are studied. This new class of setsisindependentofsemiclosedand closed sets. Also the relationship with some of the known closed...
Cloud Computing: Its Advantages and Security Issues
Cloud computing is the technology which getting attention in these days due is low-cost, flexibility and independence of the hardware and software. There are lots activities and advantages in this area but still there a...
Friendbook: Semantic Based Friendship
Now a day’s friend recommendation has a greater impact on social networking. Friend recommendation based on social graph may not be most relevant to reflect user’s expectation on friend selection. Propose approach Based...