Geographic routing used in MANET for black hole detection
Abstract
References
- Geographic routing used in MANET for black hole detection
Recommendations
Effect of Single and Cooperative Black Hole Attack in MANET using OLSR protocol
NISS '19: Proceedings of the 2nd International Conference on Networking, Information Systems & SecurityThe Mobile Ad hoc Network, also known as MANET, is continuously self-configuring without any infrastructure. The communication between nodes in MANET is insured directly without any intervention of fixed equipment or specific administration, due to ...
A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET
Mobile Ad hoc network (MANET) is a wireless network which is characterized by dynamic network topology, open medium, multi-hop communication etc. in which each device not only acts as a router but also as a host. Security in the mobile ad-hoc network is ...
An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET
TRUSTCOM '12: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and CommunicationsInterest in the area of Mobile Ad-hoc Network (MANET) is growing since last few years because of its practical applications and requirement of communication in mobile devices. However, in comparison to wired network or infrastructure-based wireless ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- Avinashilingam University: Avinashilingam University
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- Avinashilingam University
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 137Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in