The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2013
DOI: 10.5815/ijcnis.2013.05.08
|View full text |Cite
|
Sign up to set email alerts
|

Effect of Black Hole Attack on MANET Routing Protocols

Abstract: -Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure against attacks by the malicious nodes. In this paper we have analyzed the effects of Black hole attack on mobile ad hoc routing protocols. Mainly two protocols AODV and Improved AODV have been considered. Simulation has been performed on the basis of performance parameters and effect has been analyzed after adding Black-hole nodes in the network. Finally the results have been computed and compared to stumble on which … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(27 citation statements)
references
References 12 publications
0
27
0
Order By: Relevance
“…Random Waypoint Model (RWP) [1] is used as the mobility model of each node. In this model, each node chooses a random destination within the simulation area and a node moves to this destination with a random velocity.…”
Section: Simulation Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Random Waypoint Model (RWP) [1] is used as the mobility model of each node. In this model, each node chooses a random destination within the simulation area and a node moves to this destination with a random velocity.…”
Section: Simulation Environmentmentioning
confidence: 99%
“…That is to say, it is not easy for us to tell apart the legal and the illegal participants in wireless systems. Because of the above mentioned properties, the implementation of security infrastructure has become a critical challenge when we design a wireless network system [1]. If the nodes of ad hoc networks are mobile and with wireless communication to maintain the connectivity, it is known as mobile ad hoc network (MANET) and require an extremely flexible Technology for establishing communications in situations which demand a fully decentralized Network without any fixed base stations, such as battlefields, military applications, and other Emergency and disaster situations Since, all nodes are mobile, the network topology of a MANET is generally dynamic and may change frequently.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore,there is no straightforward mechanism to prevent mischievous behavior of a node such as MAC spoofing, IP spoofing, dropping packets, or altering the contents of the control packets. Protocols like SAR [15] have been developed to secure AODV against certain types of attacks. However, these protocols achieve limited security at the cost of performance degradation in terms of message overhead and latency time.…”
Section: Aodv and Its Security Problemsmentioning
confidence: 99%
“…Upon receiving RREQ by a node which is either destination node or an intermediate node with a fresh route to destination, it replies by unicasting a route reply (RREP) message to the source node [16].…”
Section: Route Discovery Processmentioning
confidence: 99%