Redirigiendo al acceso original de articulo en 22 segundos...
ARTÍCULO
TITULO

A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks

Thebiga M    
Suji Pramila    

Resumen

Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Routing Protocol is more comprehensively utilized protocol in MANETS. This type of network is more exposed to assorted number of attacks and among those, the black hole attack and its variant pull off critical detriment to the entire network .In this type of attack, named black hole attack, the noxious node utilizes its routing principles, with the view to annunciate itself, that it has the briefest route to the target node. In this paper, we have investigated all the subsisting techniques and graded the solution with a table to understand their pros and cons.

 Artículos similares

       
 
Rekha B,D.V. Ashoka    
Incorporating Heterogeneous Mobile Adhoc Networks (HMANETs) in upcoming Internet-of-Things (IoT) environment will call for evolving up with a novel inter-domain routing that is capable of sustaining the uncertainties of dynamic topologies in HMANETs. Lit... ver más

 
L Raghavendar Raju,C R K Reddy Reddy     Pág. pp. 43 - 54
Mobile ad hoc networks (MANETs) are collection of wireless mobile devices with restricted broadcast range and resources. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaborat... ver más

 
Pooja Srivastava, Seema Verma, Abhilasha Agarwal, Pooja Pooja, Shradh Gupta     Pág. 1712 - 1717
Cryptographic techniques are necessary for the security of Adhoc Network. These cryptographic Algorithms are obligatory for protection of the user data so that only the permitted user are allowed to access it. This review paper outlines the comparison of... ver más

 
Jiri Hosek,Pavel Vajsar,Milan Bartl,Karol Molnar     Pág. 42 - 48
The Mobile Adhoc Networks represent very perspective way of communication. The mobility management is on the most often discussed research issues within these networks. There have been designed many methods and algorithms to control and predict the movem... ver más

 
Oudidi Kamal,Habbani Ahmed,Elkoutbi Mohammed     Pág. pp. 24 - 32
In this paper, we introduce the original Mobile Intelligent System (MIS) in embedded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environnement for human b... ver más