TITLE

ANALYSIS OF BLACK HOLE AND WORM HOLE ATTACK ON AODV ROUTING PROTOCOL IN MANET

AUTHOR(S)
Garg, Chandni; Rewagad, Prashant
PUB. DATE
February 2013
SOURCE
Asian Journal of Computer Science & Information Technology;Feb2013, Vol. 3 Issue 2, p9
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
An ad hoc network is a collection of nodes that do not rely on a predefined infrastructure to keep the network connected. In this age of science and technology all the technical domains are continuously grown and improved day by day different kinds of communication devices and instruments are becomes common for all human. As the domain of communication is grown need to provide high performance end to end reliable delivery is increases. At the same time security measures is a one of the most issue in communication system. There are various security issues in MANET i.e. Wormhole attack, black hole attack, byzantine attack, information disclosure and resource consumption attack are some more common attacks in MANET. There is various different individual work and methods are developed to overcome these issues. But there are not any kind of common detection and prevention approach is proposed or implemented that are adoptable for MANET. In this project we are propose to design and implement a common framework to detect and prevent black hole and wormhole attack over MANET environment
ACCESSION #
88033048

 

Related Articles

  • Document capture, routing benefits.  // Network World;12/15/2008, Vol. 25 Issue 48, p24 

    The article discusses the benefits of document-capture and routing technologies to organizations and businesses in the U.S. Among the benefits are the reduced use of paper while increasing productivity, accelerating business processes and improving compliance with regulatory requirements....

  • For Knowledgebase Content That Connects, Help Your Best Minds Collaborate.  // CRM Magazine;Sep2011, Vol. 15 Issue 9, Special section p6 

    The article offers information on best practice considerations for promoting knowledge management collaboration. It includes choosing technology with rules-based routing functionality, getting executive buy-in to support the employee effort collaboration and establishing process that build-in...

  • Navigability of complex networks. Boguñá, Marián; Krioukov, Dmitri; Claffy, K. C. // Nature Physics;Jan2009, Vol. 5 Issue 1, p74 

    Routing information through networks is a universal phenomenon in both natural and man-made complex systems. When each node has full knowledge of the global network connectivity, finding short communication paths is merely a matter of distributed computation. However, in many real networks,...

  • Ensuring Data Storage Security in Tree cast Routing Architecture for Sensor Networks. Kumar, K. E. Naresh; Sagar, U. Vidya; Waheed, Mohd. Abdul // AIP Conference Proceedings;10/26/2010, Vol. 1298 Issue 1, p639 

    In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide...

  • Message from the President. Wrobel, Leo A. // Technical Support Magazine;Nov/Dec2015, Vol. 7 Issue 5, p3 

    An introduction is presented in which the editor discusses various reports within the issue on topics including information technology professionals, network routing, and changes at Network and Systems Professionals Association Inc. (NaSPA).

  • Optimized Delay Constrained QoS Routing. Prakash, P. S.; Selvan, S. // Proceedings of World Academy of Science: Engineering & Technolog;Aug2008, Vol. 44, p175 

    QoS Routing aims to find paths between senders and receivers satisfying the QoS requirements of the application which efficiently using the network resources and underlying routing algorithm to be able to find low-cost paths that satisfy given QoS constraints. The problem of finding least-cost...

  • A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols. Sreedhar, C.; Verma, S. Madhusudhana; Kasiviswanath, N. // International Journal on Computer Science & Engineering;2010, Vol. 2 Issue 2, p224 

    An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Due to the absence of any...

  • Trust Based Security Routing in Mobile Adhoc Networks. Ramana, K.Seshadri; Chari, A. A.; Kasiviswanth, N. // International Journal on Computer Science & Engineering;2010, Vol. 2 Issue 2, p259 

    Ad hoc networks are widely used in military and other scientific areas. With nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own an fixed infrastructure. It also has a certain number of characteristics which make the security difficult....

  • A Discussion on Developing Multihop Routing Metrics Sensitive to Node Mobility. Chama, Namusale; Sofia, Rute // Journal of Communications;Feb2011, Vol. 6 Issue 1, p56 

    This paper is focused on a discussion of parameters and heuristics that are expected to assist multihop routing in becoming more sensitive to node mobility. We provide a discussion concerning existing and a few proposed parameters. Moreover, the work also discusses two new heuristics based on...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics