A Review Study on Preventing and Detecting Technique of Black Hole Attack in MANET
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2017, Vol 1, Issue 4
Abstract
There are basically two types of black hole attack i.e. internal black hole and External black hole attack. Black hole is a malicious node that wrongly replies for some route requests without having active route to particular destination and drop all the getting packets. If these malicious nodes work jointly as a collection then the damage will be very risky. This type of attack is called cooperative black hole attack. Black hole attack is a type of active attack. Black hole attack can arise when the malicious node on the path attack the data transfer and purposely drop, delay or change the data transfer passing through it. Black hole node treats itself as a trusted node. This is review study on Black hole node send false routing information, claim that it has a best route and cause additional good nodes to route data packets through the black hole node. Kavita Babriya | Surender Singh"A Review Study on Preventing and Detecting Technique of Black Hole Attack in MANET" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd129.pdf http://www.ijtsrd.com/engineering/computer-engineering/129/a-review-study-on-preventing-and-detecting-technique-of-black-hole-attack-in-manet/kavita-babriya
Portable Centre Pivot Irrigation System with Advanced Control through Sensors A Review
Being hailed as the best mechanical development in farming since the substitution of draft creatures by the tractor, focus rotate water system frameworks inundate crops with a noteworthy decrease in both work and water n...
Securing Mechanism of Healthcare Data on Cloud
Healthcare data are very sensitive records which hold patients information. In order to make this information secured it should not be made available to unauthorized people. Information technology is increasingly used in...
A Survey on Google Project Loon Google Balloon
Now a days most people are on the internet, we can say that internet is one of the important aspects in everyone's life. But many live in areas where the infrastructure of internet has not yet reached. If you are in such...
Identification of Therapeutic Targets and Biomarker for Breast Cancer using Microarray Data Mining
Neuropilin2 is a family of receptor protein involved in endocrine development in Breast and ducts. The bHLH regulates transcription of Neuropilin2 NRP2 of progenitor ductal and endocrine cells to a neurogenesis and neuro...
Accountability and Public Sector Performance in the Third World Country A Case Study of Nigeria
This study focuses on accountability and public sector performance in the third world country A case study of Nigeria. The study is a demonstration of simple random sampling techniques on the bases of which a survey admi...