A Survey on Various Applications and Blackhole Attack in Mobile Ad Hoc Network
The present Mobile Ad hoc Networks known to be (MANETs) become well-liked issue for researchers, and distinctive studies have been prepared to raise introduction of ad hoc networks. In the MANET nodes are bargain to promote packets for each other impart more distant than to their scope of transmission. The mobile node is conveying through each other without some kind of foundation. MANET is an alluring technology for some applications, for example, protect and strategic tasks, because of the adaptability gave by their dynamic infrastructure. The black hole attack in wireless Ad Hoc traffic between victim node and the malicious node at that point network is real issue that requirements proficient arrangements. In black hole attack in excess of one node can be malicious. More often than not black hole attack happens in expansive Ad Hoc organizations.
Keywords: MANET, ad hoc network, ad hoc networks, blackhole attaks
Cite this Article
Ankita Gupta, Abhishek Dubey. A Survey on Various Applications and Blackhole Attack in Mobile Ad Hoc Network. Recent Trends in Parallel Computing. 2018; 5(1): 1–6p.
] Meenakshi Yadav, Nisha Uparosiya “Survey on MANET: Routing Protocols, Advantages, Problems and Security” International Journal of Innovative Computer Science & Engineering Volume 1 Issue 2; Page No. 12-17, ISSN: 2393-8528.
Pallavi Agarwal, "Secure Node Communication With Cryptographic Algorithm in Vehicular Ad Hoc Networks", International Journal of Advanced Science and Technology, Vol.109 (2017), pp.1-12.
Mrs.Padma .P, Mr.R.Suresh “Literature Survey on latest research issues in MANET” ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013.
Elbasher Elmahdi, Seong-Moo Yoo and Kumar Sharshembiev “Securing Data Forwarding against Blackhole Attacks in Mobile Ad Hoc Networks” 978-1-5386-4649-6/18/$31.00 ©2018 IEEE.
Swapnil Bhagat, Puja Padiya, Nilesh Marathe “A GENERIC REQUEST/REPLY BASED ALGORITH FOR DETECTION OF BLACKHOLE ATTACK IN MANET : SIMULATION RESULT” 8th ICCCNT 2017.
Mohammed Baqer “STAODV: A Secure and trust based approach to mitigate black hole attack on AODV based MANET” 2017, IEEE.
Nikhil G. Wakode “Defending Blackhole Attack by Using Acknowledge Based Approach in MANETs” 2017 IEEE.
Mr. Ankit D. Patel, Mr. Kartik Chawda “Blackhole and Grayhole Attacks in MANET” ICICES2014 - S.A.Engineering College, Chennai, Tamil Nadu, India.
Mohamed A. Abdelshafy, Peter J. B. King “Resisting Blackhole Attacks on MANETs” 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
Pradeep R. Dumne, Arati Manjaramkar “Cooperative Bait Detection Scheme to prevent Collaborative Blackhole or Grayhole Attacks by Malicious Nodes in MANETs” 978-1-5090-1489-7/16/$31.00 ©2016 IEEE.
A. Singh, M. Maheshwari, and N. Kumar, “Security and trust management in MANET,” in Communications in Computer and Information Science, vol. 147. New York: Springer-Verlag, 2011.
J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection and response for MANETs,” in Proc. IEEE 2004.
Y. Hu, D. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in Proc. 4th IEEE Workshop Mobile Comput. Syst. Appl., 2002.
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/