International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 105

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014


Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka [325] | Mukesh Dalal


Abstract: Mobile Ad-hoc Network (MANET) is self configured network and collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in decentralized manner. Security is major concern in MANET due to its various features such as open medium, limited power supply and lack of clear lines of defense. It is vulnerable to various types of DoS attacks like black hole, grey hole, worm hole, impersonation etc. In black hole attack, attacker claims to have shortest route to destination by injecting a fake reply message. This document introduces a comparative study of various malicious or DoS nodes detection schemes and analyse their performance based on various parameters viz node mobility, Quality of service, false alarm detection etc.


Keywords: Mobile Ad-hoc Networks MANET, Ad-hoc On Demand Distance Vector AODV, Dynamic Source Routing DSR, Denial of Service DoS, Black hole attack, malicious node


Edition: Volume 3 Issue 7, July 2014,


Pages: 1572 - 1577


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Priyanka, Mukesh Dalal, "Analysis of Various Malicious Node Detection Techniques: A Review", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 1572-1577, https://www.ijsr.net/get_abstract.php?paper_id=201412611

Similar Articles with Keyword 'Black hole attack'

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil [336] | Dr. Sudesh Kumar [2]

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

A MANET Security Using Routing Methodology

Shirsty Chandel | Prof. Ashish Tiwari

Share this Article
Top