نتایج جستجو برای: black hole attack
تعداد نتایج: 253930 فیلتر نتایج به سال:
Vehicle Ad-hoc Network is vulnerable to several attacks. One of the main attacks is the black hole attack which absorbs all the data packets in the network. In this paper, we have analyzed the performance of VANET in presence of black hole node by using different routing protocols AODV, DSR and AOMDV. This paper analyzed that which protocol is more vulnerable to the black hole attack and how mu...
Vehicle Ad-hoc Network is vulnerable to several attacks. One of the main attacks is the black hole attack which absorbs all the data packets in the network. In this paper, we have analyzed the performance of VANET in presence of black hole node by using different routing protocols AODV, DSR and AOMDV. This paper analyzed that which protocol is more vulnerable to the black hole attack and how mu...
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This generic characteristic of MANET has rendered it vulnerable to security attacks. In our research, we will address the problem of black hole attack. In this attack, a malicious node falsely advertise shorte...
A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the wired networks from traditional scenario to new paradigm. The mobile ad hoc networks are purely infrastructure less network. Due to this vulnerabilities of the network are unprotected ...
Black hole attack is one kind of routing disturbing attacks and can bring great damage to all clusters of a MANET. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, and infrastructure-less property. As a result, an efficient algorithm to detect black hole attack is important. This paper proposes and evaluates strategies ...
A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Virtual Infrastructure achieves reliable transmission in Mobi...
MANET is a self-configuring infrastructure less network. The lacks of an infrastructure in ad hoc networks pose large challenges in the functionality of these networks. Mobile Ad Hoc Network has number of security problems that exists due to the self-configuring nature of nodes. The black hole attack is one of the well known security intimidation in wireless mobile ad hoc networks. The intruder...
In wireless ad hoc networks, the absence of any control on packets forwarding, make these networks vulnerable by various deny of service attacks (DoS). A node, in wireless ad hoc network, counts always on intermediate nodes to send these packets to a given destination node. An intermediate node, which takes part in packets forwarding, may behave maliciously and drop packets which goes through i...
Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the black hole. In this attack, a malicious node advertises itself as having freshest or shortest path to specific node to absorb packets to itself. The effect of black hole attack on ad hoc network using AODV as a routing proto...
Exposure and Avoidance Mechanism of Black Hole and Jamming Attack in Mobile Ad Hoc Network: A Review
Mobile ad hoc network (MANETs) is an infrastructureless/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید