A Survey on Black hole Attack Detection Methods

Abstract

 MANET(Mobile Ad Hoc Networks) is important and growing technology, because of its characteristics such as mobility, easy deployment, also it doesn’t required any centralized management and predefined infrastructure, increases its applications in real life. But other side this characteristics becomes its disadvantage and it becomes vulnerable to several security threats. Black hole is the one of the most dangerous attack in MANET, in which adversary node claims that it has fresh and shortest path to the destination but in reality it doesn’t, and after receiving all packets from source it drops all packets. In this survey paper we study different black hole detection techniques.

Authors and Affiliations

Vidhya Patil*

Keywords

Related Articles

 FIREWALL ENGINE BASED ON GRAPHICS PROCESSING UNIT

 [b]A firewall is very important object in network security. The Working of firewall policy rules has become time consuming and very much complex. The main issue is the slow filtering action during heavy load of in...

 DETERMINATION OF OPTIMAL LOCATION OF SVC CONTROLLER DEVICES IN ELECTRIC TRANSMISSION SYSTEM BY USING PSO METHOD

 This paper aims to identify the optimal location for the installation of SVC controller using Particle Swarm Optimization (PSO) method to mitigate small signal oscillations in a multi machine power system reducing...

SPATIAL INVERTED INDEX FOR SEARCHING MUILTIDIMENSIONAL DATA

Conventional spatial queries, such as range search and nearest neighbor retrieval, involve only conditions on objects’ geometric properties. Today, many modern applications call for novel forms of queries t...

 AUTOMATION OF REST ENDPOINT OF CLUSTERED STORAGE SYSTEM

 Planning, designing, developing, testing and deployment are the different phases in software development life cycle. Manually testing the storage systems is a very tedious job. There is also high chance of missing...

COMPARITIVE STUDY OF VARIOUS DISTANCE MEASURES FOR ISOLATED SPEECH RECOGNITION APPLICATION

Speech recognition applications are becoming common these days as many of the modern devices designed are user - friendly for the convenience of general public. Speaking or communicating directly with the machine to a...

Download PDF file
  • EP ID EP148330
  • DOI -
  • Views 62
  • Downloads 0

How To Cite

Vidhya Patil* (30).  A Survey on Black hole Attack Detection Methods. International Journal of Engineering Sciences & Research Technology, 3(11), 698-707. https://europub.co.uk/articles/-A-148330