Downloads: 115
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013
Detection and Mitigation Techniques of Black Hole Attack in MANET: An Overview
Swati Jain | Naveen Hemrajani [2]
Abstract: As the increase of wireless networks, use of mobile phones, smart devices are gaining popularity so the adhoc network is also an uprising field. Each device in a MANET is free to move independently in any direction, linking to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, and quality of service, limited bandwidth and limited power supply etc. This paper describes the features, application, and vulnerabilities of mobile ad hoc network also presents an overview and the study of the attacks and their mitigation in routing protocols
Keywords: MANET, Wireless Networks, Ad hoc Networking, Routing Protocol
Edition: Volume 2 Issue 5, May 2013,
Pages: 70 - 73
Similar Articles with Keyword 'MANET'
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar | Purnima Selokar [2]
Downloads: 3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon | Dinesh Kumar [29]