International forum of researchers Students and Academician
Ad-hoc network provides quick communication among knob to convey the packets from one knob to other. These networks are independent of any fixed infrastructure or central entity like cellular networks which requires fixed infrastructure to operate. Any malicious knob in the network can disturb the whole process or can even stop it. Several attacks like replay attack, black hole, wormhole and rushing etc, in which legitimate knob behaves like malicious knob and disturbed whole the network. To define and detect the malicious behavior of a knob, it becomes obligatory to define the regular and malicious behavior of a knob.