Review on Various Security Threats and There Mitigation Technique for Mobile Ad Hoc Network

Ad hoc is wireless, in dependable infrastructure dynamic and self-organize network creates among different mobile host. Network generally exists in a Disaster recoveries, military activities emergency operation. Routing protocol has a major role in mobile network, which are affected from different attacks. Ad hoc On demand Distance Vector (AODV) routing protocol is suitable for routing protocol. Black hole attack is a serious hazard, in this attack a malicious node add spoof route and advertise shortest path to destination node and absorbs all data packet in it. In this paper, the authors have surveyed and compare the existing solution to black hole attack on AODV protocol and their demerit.

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
International Journal of Technology Research and Management(IJTRM)
Topic:
Networking
Format:
PDF