International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Earlier Behaviours Monitoring Dynamic Source Routing (EBM-DSR) Based Detection Of Black Hole Attack In Manet

Author :M.D.Vimalapriya, S.Santhosh Baboo

Article Citation :M.D.Vimalapriya ,S.Santhosh Baboo , (2014 ) " Earlier Behaviours Monitoring Dynamic Source Routing (EBM-DSR) Based Detection Of Black Hole Attack In Manet " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 49-53, Volume-2,Issue-11

Abstract : Mobile ad hoc networks (MANETs) have been proposed to support dynamic situations wherever no infrastructure exists. Every node within the network acts as a host similarly as a router and, forwards traffic to other nodes. Efficient and secure routing is the heart of any network and particularly difficult in an infrastructure-less network where participating nodes are portable and mobile. Routing in MANETs is vulnerable to threats since communication in ad hoc networks is relies upon the cooperation of nodes for forwarding packets. Therefore, it is a challenge for researchers to infix solutions to a Black Hole attacks in existing routing protocols. This research work contributes towards mitigating attacks on routing protocols in ad hoc networks and provides solutions to handle Black Hole attack. However in existing DSR, there is no security provision against a well-known “Black Hole” attack. Black Hole nodes which can be referred malicious nodes that conform to forward packet to destination however do not forward packet deliberately. These Black Hole nodes participate in the network actively and degrade the performance of network. In this paper proposed a solution for detecting the malicious node in DSR protocol suffering from Black Hole attack.

Type : Research paper

Published : Volume-2,Issue-11


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1394   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 60
| Published on 2014-11-01
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY