Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 3

Abstract

In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due inherent characteristics like decentralization, self configuring, self -organizing networks, they can be deployed easily without need of expensive infrastructure and  have wide range of military to civilian and commercial applications. But wireless medium, dynamically changing topology, limited battery and lack of centralized control in MANETs, make them vulnerable to various types of attacks. This paper focus on network layer packet dropping attacks – Black Hole & Gray Hole attacks in Dynamic Source Routing (DSR) based MANETs and discuss various pros and cons of acknowledgement based techniques for detection of above said attacks.

Authors and Affiliations

Rajveer Kaur, Dr. Shaveta Rani, Dr. Paramjeet Singh

Keywords

Related Articles

Providing Security in Data Aggregation using RSA algorithm

The RSA algorithm proposed by Rivest, Adi Shamir and Leonard Adleman is cryptography technique. The current problem with wireless sensor network is how to protect the  security of the sensor data. RSA algoritm is used a...

A REVIEW ON DYNAMIC RESOURCE ALLOCATION BASED ON LEASE TYPES IN CLOUD ENVIRONMENT

Load balancing is one of the essential factors to enhance the working performance of the cloud service provider. Cloud Computing is an emerging computing paradigm. It aims to share data, calculations, and service transpa...

Introduction to Cloud Computing

The Cloud computing is a fastest growing area in IT industry, computing and research industry. Cloud is a pool of virtualized computer resources .A cloud can support self-redundant, self-recovering and scalable programmi...

Security Test by using F T M and Data Allocation Strategies on Leakage Detection

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems...

An Energy Efficient Data Transfer Mechanism for Wireless Sensor Network

Wireless Sensor Networks (WSNs) are generally energy and resource constrained. In most WSN applications the traffic pattern is from sensor-to-sink and for effective utilization of available resources in network data aggr...

Download PDF file
  • EP ID EP650002
  • DOI 10.24297/ijct.v5i3.3522
  • Views 103
  • Downloads 0

How To Cite

Rajveer Kaur, Dr. Shaveta Rani, Dr. Paramjeet Singh (2013). Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 5(3), 214-219. https://europub.co.uk/articles/-A-650002