نتایج جستجو برای: black hole attack

تعداد نتایج: 253930  

Journal: :International Journal of Computer Applications 2018

2014
K.Suresh Babu

In MANETs, providing the security to the network from the routing attacks like black hole and gray hole is a big challenge. To resolve the above issues, in this paper we implement a cross layer based detection and authentication technique for secure multipath routing (CLDASR). In the authentication method, when a source wants to send a data packet or a RREQ packet, it generates a hash value als...

Journal: :CoRR 2015
Sonal Shrivastava Chetan Agrawal Anurag Jain

In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver data in between source and destination. In this research we work on security field in MANET ...

2012
Shyamala Ramachandran Valli Shanmugam

Routing is a basic step for data exchange. In wireless ad-hoc networks each node acts as a router and executes a routing protocol. Wireless ad-hoc networks are highly resource constrained in terms of network topology, memory and computation power. The reliable data transfer is a difficult task in wireless ad-hoc networks because of resource constraints. A mobile ad-hoc network (MANET) is a kind...

2014
Ketan Sureshbhai Ketan Sureshbhai Chavda

Ad-hoc network is an autonomous mobile node. It is a set of temporary based networks, which has not fixed infrastructure. The Ad-hoc networks are very much positive towards attack by malicious node due to its vulnerabilities nature of routing protocols. There are large numbers of attacks affect the Ad-hoc networks. In between these attacks one is very much known as Black Hole Attack. In this pa...

2015

This paper focuses on the issues related to the simple and cooperative black hole attacks in multihop wireless ad hoc networks. In multi-hop wireless ad hoc networks, nodes not in direct range rely on intermediate nodes to communicate. In order to preserve its limited resources or to launch a DoS attack, an intermediate node drops packets going through it instead to forward them to its successo...

2012
Akanksha Jain

A Wireless Mobile Ad-hoc Network consists of a number of mobile nodes that temporally form a dynamic infrastructure less network. To enable communication between nodes that do not have direct radio contact, each node must function as a wireless router and potential forward data traffic of behalf of the other. Detecting malicious nodes (Attacker) in an open ad hoc network in which participating ...

Journal: :CoRR 2013
Deepali Virmani Ankita Soni Nikhil Batra

Wireless sensor networks are vulnerable to several attacks, one of them being the black hole attack. A black hole is a malicious node that attracts all the traffic in the network by advertising that it has the shortest path in the network. Once it receives the packet from other nodes, it drops all the packets causing loss of critical information. In this paper we propose a reliability analysis ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید