Review on Various Security Threats and There Mitigation Technique for Mobile Ad Hoc Network

Download Now
Provided by: International Journal of Technology Research and Management(IJTRM)
Topic: Networking
Format: PDF
Ad hoc is wireless, in dependable infrastructure dynamic and self-organize network creates among different mobile host. Network generally exists in a Disaster recoveries, military activities emergency operation. Routing protocol has a major role in mobile network, which are affected from different attacks. Ad hoc On demand Distance Vector (AODV) routing protocol is suitable for routing protocol. Black hole attack is a serious hazard, in this attack a malicious node add spoof route and advertise shortest path to destination node and absorbs all data packet in it. In this paper, the authors have surveyed and compare the existing solution to black hole attack on AODV protocol and their demerit.
Download Now

Find By Topic