Detection and Mitigation Techniques of Black Hole Attack in MANET: An Overview
Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 5)Publication Date: 2013-05-05
Authors : Swati Jain; Naveen Hemrajani;
Page : 70-73
Keywords : MANET; Wireless Networks; Ad hoc Networking; Routing Protocol;
Abstract
As the increase of wireless networks, use of mobile phones, smart devices are gaining popularity so the adhoc network is also an uprising field. Each device in a MANET is free to move independently in any direction, linking to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, and quality of service, limited bandwidth and limited power supply etc. This paper describes the features, application, and vulnerabilities of mobile ad hoc network also presents an overview and the study of the attacks and their mitigation in routing protocols
Other Latest Articles
- Query Explication by Semantic Approach
- Lipid patterns in Sub clinical hypothyroidism of non-obese group in Rural tertiary care centre
- Human Identification by Ear Images Using SIFT Algorithm
- Design and interfacing of the optical assembly For Automated Analyzer
- Effective Tunneling Of Data And Traffic Management Over Network Using L2TP Based ON L2F
Last modified: 2021-06-30 20:16:32