A Review of Detection & Prevention Techniques of Black & Gray Hole Attacks in MANET
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
Mobile ad hoc network (MANET) is a self-organizing, self-configuring wireless network consisting of mobile nodes. It does not require any centralized access point. There is no need for any fixed infrastructure for nodes to communicate between themselves. Manet is vulnerable to various attacks due to lack of centralized monitoring and regular changing topologies. Security has become one of the challenging issues to protect MANET from various malicious attacks and provide protected communication between nodes. In this paper a study made on different methods that have designed to detect and prevent Black and Gray hole attack in MANET. A comparison table is designed to compare different methods.
Authors and Affiliations
Manan Arora
Exploration of Novel Algorithm for Reduced Computational Time by Using Fuzzy Classification Technique in Data Mining
we will work on reduction of unwanted data sets from large data sets. We apply fuzzy logic , classification and data mining techniques to do the same. The size of data items is very large, so it is difficult to reduce i...
Design of web-based information systems– New challenges for systems development
The web-technology is going through major changes these years, both with respect to types of systems based on webtechnology, organization of the development work, required approaches and competencies, etc. We must rethin...
Understanding the Fundamentals of Machine Learning Field, Its Evolution & Its Need
Since the time of inception of computers, many computer scientists and researchers have been fascinated by the idea of programming machines in such a manner that can make them learn the way humans do from their surround...
Preliminary Studies On Biodecolorization Of Reactive Red 35 By Pseudomonas Aeruginosa Arsks20
Pseudomonas aeruginosa ARSKS20, an antibiotics sensitive strain could decolorize Reactive Red 35(RR35) dye up to 95% with 8.27 mg l-1 h-1 at 40°C, pH 8, under static condition at 100 mg l-1 concentration. Yeast extract...
Secure Cloud Storage Using Decentralized Access Control with Unspecified Authentication
The Secure Cloud Storage Using Decentralized Access Control with Unspecified Authentication for secures the data. The cloud verifies the authenticity of the series without knowing the user’s identity before storing data...