Mobility Investigate

Mobile Adhoc Network Under the Adaptive TCP Variants Techniques for Maximization of Throughput

Download now Free registration required

Executive Summary

It is an ad-hoc network which is set up by wireless mobile computers (or nodes) which moves randomly in the places that have no network infrastructure or hard to reach location. Since the nodes communicate with each other to gather network information. They cooperate by forwarding data packets to other nodes in the network. In wireless ad-hoc networks, cooperation between nodes takes place so that they route each other's packet till it reaches destination. Hence they are exposes to a wide range of security attacks. Also because the vulnerability of routing protocols, the wireless ad-hoc networks have to face several security risks. One of these attacks is the Black hole Attack against network integrity which absorbs all data packets in the network.

  • Format: PDF
  • Size: 571.16 KB