Detection of Black Hole Attack in DTN with Authentication

Provided by: International Journal Of Engineering And Computer Science
Topic: Networking
Format: PDF
DTN such as sensor networks with schedule occurring at irregular intervals and the packets transferring will be referred to as store carry-forward technique. Here the routing is decided with characterized by opportunity. These nodes will be acts like malicious node. Here the malicious behavior can be occurred due to the attacker/hacker who leads to lose of data and increases remission delay, to overcome this problem the authors are using the service provider term which provides the services to the senders and the receivers with confidentially.

Find By Topic