Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 3
Abstract
In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due inherent characteristics like decentralization, self configuring, self -organizing networks, they can be deployed easily without need of expensive infrastructure and have wide range of military to civilian and commercial applications. But wireless medium, dynamically changing topology, limited battery and lack of centralized control in MANETs, make them vulnerable to various types of attacks. This paper focus on network layer packet dropping attacks – Black Hole & Gray Hole attacks in Dynamic Source Routing (DSR) based MANETs and discuss various pros and cons of acknowledgement based techniques for detection of above said attacks.
Authors and Affiliations
Rajveer Kaur, Dr. Shaveta Rani, Dr. Paramjeet Singh
Segmentation In Medical Resonance images to extract the cancerous nodule for early diagnosis on cancer
Image segmentation plays a vital role in several medical imaging programs by assisting the delineation of physiological structures along with other parts. The objective of this research work is to segmentize human lung M...
ANALYSIS OF HUMAN FACE RECOGNITION ALGORITHM USING PCA+FDIT IN IMAGE DATABASE FOR CRIME INVESTIGATION
In general, the field of face recognition has lots of research that have put interest in order to detect the face and to identify it and also to track it. Many researchers have concentrated on the face identification and...
A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANET
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its secu...
Automated Translation Preference with a Bilingual Chatbot
Free, online language translation services are being used by people around to the world to facilitate communication. However, it takes time and effort for a person to load the Web page in a browser, copy and paste text i...
Topological Properties of Rough Soft Formal Context
In this paper, the topological structure is discussed in the rough soft formal context. The rough soft formal context is defined on the rough formal context with some soft operators, the topology and the topological spac...