A Survey on Black hole Attack Detection Methods
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 11
Abstract
MANET(Mobile Ad Hoc Networks) is important and growing technology, because of its characteristics such as mobility, easy deployment, also it doesn’t required any centralized management and predefined infrastructure, increases its applications in real life. But other side this characteristics becomes its disadvantage and it becomes vulnerable to several security threats. Black hole is the one of the most dangerous attack in MANET, in which adversary node claims that it has fresh and shortest path to the destination but in reality it doesn’t, and after receiving all packets from source it drops all packets. In this survey paper we study different black hole detection techniques.
Authors and Affiliations
Vidhya Patil*
FIREWALL ENGINE BASED ON GRAPHICS PROCESSING UNIT
[b]A firewall is very important object in network security. The Working of firewall policy rules has become time consuming and very much complex. The main issue is the slow filtering action during heavy load of in...
DETERMINATION OF OPTIMAL LOCATION OF SVC CONTROLLER DEVICES IN ELECTRIC TRANSMISSION SYSTEM BY USING PSO METHOD
This paper aims to identify the optimal location for the installation of SVC controller using Particle Swarm Optimization (PSO) method to mitigate small signal oscillations in a multi machine power system reducing...
SPATIAL INVERTED INDEX FOR SEARCHING MUILTIDIMENSIONAL DATA
Conventional spatial queries, such as range search and nearest neighbor retrieval, involve only conditions on objects’ geometric properties. Today, many modern applications call for novel forms of queries t...
AUTOMATION OF REST ENDPOINT OF CLUSTERED STORAGE SYSTEM
Planning, designing, developing, testing and deployment are the different phases in software development life cycle. Manually testing the storage systems is a very tedious job. There is also high chance of missing...
COMPARITIVE STUDY OF VARIOUS DISTANCE MEASURES FOR ISOLATED SPEECH RECOGNITION APPLICATION
Speech recognition applications are becoming common these days as many of the modern devices designed are user - friendly for the convenience of general public. Speaking or communicating directly with the machine to a...