نتایج جستجو برای: black hole attack

تعداد نتایج: 253930  

2014
Dhaval J. Rana

Mobile ad hoc network (MANET) is a self-implemented network of mobile nodes formed anytime and anywhere without the help of a centralized management. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared to wired network or infrastructure-based wi...

Journal: :J. UCS 2016
Muneer O. Bani Yassein Yaser M. Khamayseh Mai AbuJazoh

The security issue is essential and more challenging in Mobile Ad-Hoc Network (MANET) due to its characteristics such as, node mobility, self-organizing capability and dynamic topology. MANET is vulnerable to different types of attacks. One of possible attacks is black hole attack. Black hole attack occurs when a malicious node joins the network with the aim of intercepting data packets which a...

2014
Ameeta Seehra

A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes, which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the detection and prevention of black-hole attack in MANETs. In this approach every member of t...

2016
S. Rakesh Kumar N. Gayathri T. Manikandan

Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANETs). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black h...

2014
Neeraj Arora

A Mobile Ad-hoc NETwork (MANET) is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Due to the openness of its nature it is vulnerable to various kinds of threats and malicious nodes are difficult to detect since every node participates in the operation of the network equally. One of the security thread is Black hole attack in which...

2013
Harmandeep Singh Manpreet Singh

Wireless or mobile network is the new generation of wireless network that is different from the wired approach in many aspects like power and energy efficient routing protocols, routing configuration, network infrastructure. There are several protocols proposed for the deployment of MANETs in fields like government, military etc. In this paper we are proposing a technique to identify attack i.e...

2014
J. Anne Shirley J. John Raybin Jose

A Wireless Sensor Network (WSN) consists of distributed an autonomous devices that monitors both physical and environmental conditions. Sensor Networks are used for weather prediction and measuring temperature, sound, wave, vibration, pressure etc. Sensor Networks suffer from various security attacks like (i) sink hole attack, (ii) black hole attack, (iii) wormhole attack and (iv) selective for...

Journal: :International Journal of Computer Applications 2012

2012
Himani Yadav Rakesh Kumar

Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANETs). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black h...

Journal: :IJBDCN 2011
M. Umaparvathi Dharmishtan K. Varughese

Mobile Adhoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics like dynamic topology, shared medium, absence of infrastructure, and resource constraints. Data packets sent by a source node may reach destination through a number of intermediate nodes. In the absence of security mechanism, it is easy for an intermediate node to intercept or modify the messa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید