Performance Evaluation of Different Protocols under Blackhole and Wormhole Attacks

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

Mobile Ad hoc Networks (MANETs) refer to mostly wireless - networks where all network components are mobile. In a MANET there is no distinction between a host and a router since all network hosts can be endpoints as well as forwarders of traffic. .

Authors and Affiliations

Keywords

Related Articles

A Literature Survey on Contrast Data Mining

Data mining refers to extracting or “mining” knowledge from large amount of data. Data mining also called KDD (Knowledge Discovery). There are some types of classification techniques : Decision Tree, Naïve Bayesian, Neur...

Assessment of Chlorination Efficiency and Quality of Municipal Drinking Water in Gwalior City, Madhya Pradesh, India

The quality of drinking water at the point of delivery to the consumer is crucial in safeguarding people’s health. This study was carried out to study effectiveness of chlorination throughout drinking water distribution...

A Case Study on Care Giving Among Mentally Disabled Persons in Institutionalized Settings

This study provides brief findings on the impact of care givers among mentally disabled persons. The study deals about the relationship between the care givers and the care recipient, the nature of the care recipient’s d...

Isolation of Antagonistic Actinomycetes SPS from Rhizosphere of BT Cotton

"Isolation of Antagonistic Actinomycetes sps from Rhizosphere of Bt cotton T. sujatha1 and P. Siva Raagini2 1 & 2Department of Applied Microbiology, Sri Padmavati Mahila Visvavidyalayam, Tirupati. A.P. India. 1SR&BGNR Go...

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Abstract-The DTN technology is the famous technology which used in the military network it is differ from the normal peer to peer network it is having the storage network if the connection is not establish it will store...

Download PDF file
  • EP ID EP364720
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

(2015). Performance Evaluation of Different Protocols under Blackhole and Wormhole Attacks. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-364720