Black hole attack behavioral analysis general network scalability
نویسندگان
چکیده
منابع مشابه
Performance analysis of Black Hole Attack on
Vehicle Ad-hoc Network is vulnerable to several attacks. One of the main attacks is the black hole attack which absorbs all the data packets in the network. In this paper, we have analyzed the performance of VANET in presence of black hole node by using different routing protocols AODV, DSR and AOMDV. This paper analyzed that which protocol is more vulnerable to the black hole attack and how mu...
متن کاملPerformance Evaluation of Wireless Sensor Network under Black Hole Attack
Wireless sensor networks are vulnerable against various types of external and internal attacks being limited by computation resources, smaller memory capacity, limited battery life, processing power & lack of tamper resistant packaging. The black hole attack is one of the well-known security threats in wireless sensor networks. The intruders utilize the loophole to carry out their malicious beh...
متن کاملMitigating Black Hole attack in MANET by Extending Network Knowledge
The Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Network. It operates as a table driven, proactive protocol. The core of the OLSR protocol is the selection of Multipoint Relays (MPRs), used as a flooding mechanism for distributing control traffic messages in the network, and reducing the redundancy in the flooding process. A node in an OLSR network selects its MPR set so...
متن کاملBlack Hole and Greyhole Attack in Wireless Mesh Network
Security is an important need in wireless mesh networks to give safe and shared information between wireless non-static nodes. In wireless network nodes has ability to act correctly and route the packets. Wireless mesh networks unusual method of producing,keeping and sharing information ability of mobile objects to show spontaneous and cheap adjusting arrangement itself.There are different type...
متن کاملReliability Analysis to overcome Black Hole Attack in Wireless Sensor Network
Wireless sensor networks are vulnerable to several attacks, one of them being the black hole attack. A black hole is a malicious node that attracts all the traffic in the network by advertising that it has the shortest path in the network. Once it receives the packet from other nodes, it drops all the packets causing loss of critical information. In this paper we propose a reliability analysis ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2019
ISSN: 2502-4760,2502-4752
DOI: 10.11591/ijeecs.v13.i2.pp677-682