Enhancement in Elimination of Security Threads using Trusted Proactive Routing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 9, Issue 3

Abstract

 Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible that eventually a malicious node becomes easy to deploy in ad hoc n/w and they cause among other impact performance degradation. One attack that can deploy by malicious node is black hole attack. This paper reviews the problem of occurrence of black hole attack and its solution technique proposed enhancement in proactive routing protocol Destination Sequenced Distance Vector Routing protocol Using trust based and hop count method.

Authors and Affiliations

Shilpa Jaiswal

Keywords

Related Articles

 Load Balancing In Public Cloud

 In present days cloud computing is one of the greatestplatform which provides storage of data in very lowercost and available for all time over the internet.But ithas more critical issue like security, load man...

 A Hybrid Approach for Performance Enhancement of VANETusing CSMA-MACA: a Review

 Abstract: A wireless sensor network (WSNs) have increased gigantic consideration for their extensive varietyof utilization, for example, environmental checking, military consideration, medical services, fiascoadmin...

A Review on Software Fault Detection and Prevention Mechanism in Software Development Activities

Abstract: The need of distributed and complex commercial applications in enterprise demands error free and quality application systems. This makes it extremely important in software development to develop quality and fau...

A Critical Analysis of Knowledge Management in E-Learning

The integration of knowledge management (Klick) and e-encyclopaedism (Altitude) become inevitable day by day. KM coating focuses in providing institutions with prick to enrich knowledge, while the EL focuses on managing...

 Image Steganography Based On Hill Cipher with Key Hiding  Technique

 In today’s digital world invisible ink and paper have been replaced by much more versatile and practical covers for hiding messages – digital documents, images, video, and audio files. As long as an electronic...

Download PDF file
  • EP ID EP109472
  • DOI -
  • Views 95
  • Downloads 0

How To Cite

Shilpa Jaiswal (2013).  Enhancement in Elimination of Security Threads using Trusted Proactive Routing. IOSR Journals (IOSR Journal of Computer Engineering), 9(3), 82-88. https://www.europub.co.uk/articles/-A-109472