A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks
Dublin Core
Title
A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks
Subject
-Mobile Adhoc Networks
Adhoc on Demand Routing Protocol
Attacks
Black hole attack
noxious node.
Description
Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Routing Protocol is more comprehensively utilized protocol in MANETS. This type of network is more exposed to assorted number of attacks and among those, the black hole attack and its variant pull off critical detriment to the entire network .In this type of attack, named black hole attack, the noxious node utilizes its routing principles, with the view to annunciate itself, that it has the briefest route to the target node. In this paper, we have investigated all the subsisting techniques and graded the solution with a table to understand their pros and cons.
Creator
M, Thebiga
Pramila, Suji
Source
International Journal of Interactive Mobile Technologies (iJIM); Vol. 14 No. 01 (2020); pp. 96-108
1865-7923
Publisher
International Association of Online Engineering (IAOE), Vienna, Austria
Date
2020-01-20
Rights
Copyright (c) 2020 Thebiga M, suji Pramila
Relation
Format
application/pdf
Language
eng
Type
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Identifier
Citation
Thebiga M and Suji Pramila, A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks, International Association of Online Engineering (IAOE), Vienna, Austria, 2020, accessed November 9, 2024, https://igi.indrastra.com/items/show/1546