Abstract

Mobile Ad Hoc Network (MANET) is an auto Configuring network. Due to its natural characteristics, a MANET is vulnerable to many security threats. Blackhole attack compromises the performance and the reliability of the network. Since nodes are allowed to move freely within the network, it becomes very important to protect the communication among mobile nodes for the sake of security. In this paper we have investigated various techniques that can detect Blackhole attacks in MANET and we have compared the detection techniques with different matrices such as Average Packet Delivery ratio and Average End-To-End delay.

Highlights

  • Ad hoc networks are not centralized and are wireless networks

  • Mobile Ad Hoc Network (MANET) security attacks are classified into Active Attack and Passive Attack

  • MRAODV, ADHOC routing are prone to various attacks such as Denial of Service (DoS) attack

Read more

Summary

Introduction

Ad hoc networks are not centralized and are wireless networks. They are infrastructure less networks, suitable for situations where setting an infrastructure is either not feasible or is costly. Mingyan et al (1999), a mobile Ad hoc Network is dynamic in nature and in such a network nodes are allowed to move freely during the communication. MANET security attacks are classified into Active Attack and Passive Attack. The assault is not intended to destroy the operation of the protocol but to reveal the information of the network. Disclosure and Denial of Service attack are known as active attacks. In impersonation first the assaulting node slips into the network by donning the identity of some other node and transmits false routing information

Disclosure
Simulation and Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.