A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks

Dublin Core

Title

A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks

Subject

-Mobile Adhoc Networks
Adhoc on Demand Routing Protocol
Attacks
Black hole attack
noxious node.

Description

Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Routing Protocol is more comprehensively utilized protocol in MANETS. This type of network is more exposed to assorted number of attacks and among those, the black hole attack and its variant pull off critical detriment to the entire network .In this type of attack, named black hole attack, the noxious node utilizes its routing principles, with the view to annunciate itself, that it has the briefest route to the target node. In this paper, we have investigated all the subsisting techniques and graded the solution with a table to understand their pros and cons.

Creator

M, Thebiga
Pramila, Suji

Source

International Journal of Interactive Mobile Technologies (iJIM); Vol. 14 No. 01 (2020); pp. 96-108
1865-7923

Publisher

International Association of Online Engineering (IAOE), Vienna, Austria

Date

2020-01-20

Rights

Copyright (c) 2020 Thebiga M, suji Pramila

Relation

Format

application/pdf

Language

eng

Type

info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article

Identifier

Citation

Thebiga M and Suji Pramila, A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks, International Association of Online Engineering (IAOE), Vienna, Austria, 2020, accessed November 9, 2024, https://igi.indrastra.com/items/show/1546

Social Bookmarking