Abstract
Mobile Ad Hoc Network (MANET) is an auto Configuring network. Due to its natural characteristics, a MANET is vulnerable to many security threats. Blackhole attack compromises the performance and the reliability of the network. Since nodes are allowed to move freely within the network, it becomes very important to protect the communication among mobile nodes for the sake of security. In this paper we have investigated various techniques that can detect Blackhole attacks in MANET and we have compared the detection techniques with different matrices such as Average Packet Delivery ratio and Average End-To-End delay.
Highlights
Ad hoc networks are not centralized and are wireless networks
Mobile Ad Hoc Network (MANET) security attacks are classified into Active Attack and Passive Attack
MRAODV, ADHOC routing are prone to various attacks such as Denial of Service (DoS) attack
Summary
Ad hoc networks are not centralized and are wireless networks. They are infrastructure less networks, suitable for situations where setting an infrastructure is either not feasible or is costly. Mingyan et al (1999), a mobile Ad hoc Network is dynamic in nature and in such a network nodes are allowed to move freely during the communication. MANET security attacks are classified into Active Attack and Passive Attack. The assault is not intended to destroy the operation of the protocol but to reveal the information of the network. Disclosure and Denial of Service attack are known as active attacks. In impersonation first the assaulting node slips into the network by donning the identity of some other node and transmits false routing information
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.