2013
DOI: 10.5120/9892-4459
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of different Radio Propagation Models with and without Black Hole Attack on AODV Routing Protocol in MANET

Abstract: A Mobile ad-hoc network (MANET) is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. In this paper the AODV routing protocol in MANET will be discussed. Also various security threats on MANET will be discussed with our major concern on the Black Hole attack . In the later part of this paper there is a description of different radio propagation models and then compare their performance on AODV, with and without Black Hole attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The communication range of the wireless nodes is set at the default distance of 250m. The transmission range of the node can be adjusted from the two ray ground formula, as below [6]:…”
Section: ) Simulation Environmentmentioning
confidence: 99%
“…The communication range of the wireless nodes is set at the default distance of 250m. The transmission range of the node can be adjusted from the two ray ground formula, as below [6]:…”
Section: ) Simulation Environmentmentioning
confidence: 99%
“…Hence, the tilt reliance of shadowing may require a reexamining of as of now accessible propagation models and suspicions. Mehta et al (2013) examined and analyzed the exhibition of three significant radio propagation models that are two beam ground, free space and shadowing with the presentation assessment measurements that are PDR and E2ED. The MANET convention considered here is AODV and they have likewise thought to be a malignant assault known as dark gap assault.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This, in turn, can then be applied for areas that face difficulties with communication like signal strength, like in communities in the provinces, or farther areas. In line with this, wireless communications with several applications in different aspects have been in demand nowadays [29,30,31].…”
Section: Recommendationsmentioning
confidence: 99%