International Journal of Computer Applications
Mobile ad-hoc Networks are the collection of self-organizing and independent nodes that can interact with one another by creating radio network. In multi-hop wireless ad-hoc networks, the nodes not in direct range rely/dependent upon intermediate nodes to interact. For securing its limited resources or to organize Denial-of-Service (DoS) attack, the middle node for instance the intermediary node drops all the packets going through it instead to forward them to its descendant. This review paper can deal with the misbehavior called black hole attack which is one of the security attacks and occurs in the network layer.