Eine Plattform für die Wissenschaft: Bauingenieurwesen, Architektur und Urbanistik
Analysis of Different Black Hole Attack Detection Mechanisms for AODV Routing Protocol in Robotics Mobile AdHoc Networks
Robotics Mobile Ad-hoc Networks (MANETs) are comprised of stations having mobility with no central authority and control. The stations having mobility in Robotics MANETs work as a host as well as a router. Due to the unique characteristics of Robotics MANETs such type of networks are vulnerable to different security attacks. Ad-hoc On-demand Distance Vector (AODV) is a routing protocol that belongs to the reactive category of routing protocols in Robotics MANETs. However, it is more vulnerable to the Black hole (BH) attack that is one of the most common attacks in the Robotics MANETs environment. In this attack during the route disclosure procedure a malicious station promotes itself as a most brief path to the destination as well as after that drop every one of the data gotten by the malicious station. Meanwhile the packets don't reach to its ideal goal, the BH attack turns out to be progressively escalated when a heap of malicious stations attack the system as a gathering. This research analyzed different BH finding as well as removal mechanisms for AODV routing protocol.
Analysis of Different Black Hole Attack Detection Mechanisms for AODV Routing Protocol in Robotics Mobile AdHoc Networks
Robotics Mobile Ad-hoc Networks (MANETs) are comprised of stations having mobility with no central authority and control. The stations having mobility in Robotics MANETs work as a host as well as a router. Due to the unique characteristics of Robotics MANETs such type of networks are vulnerable to different security attacks. Ad-hoc On-demand Distance Vector (AODV) is a routing protocol that belongs to the reactive category of routing protocols in Robotics MANETs. However, it is more vulnerable to the Black hole (BH) attack that is one of the most common attacks in the Robotics MANETs environment. In this attack during the route disclosure procedure a malicious station promotes itself as a most brief path to the destination as well as after that drop every one of the data gotten by the malicious station. Meanwhile the packets don't reach to its ideal goal, the BH attack turns out to be progressively escalated when a heap of malicious stations attack the system as a gathering. This research analyzed different BH finding as well as removal mechanisms for AODV routing protocol.
Analysis of Different Black Hole Attack Detection Mechanisms for AODV Routing Protocol in Robotics Mobile AdHoc Networks
Shakeel, Muhammad (Autor:in) / Saeed, Khalid (Autor:in) / Ahmed, Sheeraz (Autor:in) / Nawaz, Asif (Autor:in) / Jan, Sadeeq (Autor:in) / Najam, Zeeshan (Autor:in)
01.02.2020
1142575 byte
Aufsatz (Konferenz)
Elektronische Ressource
Englisch
An Effective Strategy to Defense Black Hole Attack Based on AODV Routing Protocol
British Library Conference Proceedings | 2011
|The Research and Improvement of Routing Protocol in Adhoc Network
British Library Conference Proceedings | 2011
|Cross-Layer and Energy-Aware AODV Routing Protocol for Flying Ad-Hoc Networks
DOAJ | 2022
|Research on AODV Routing Protocol Optimization in Wireless Sensor Network
British Library Online Contents | 2011
|New Routing Metrics for ADHOC Network Routing Protocols
Springer Verlag | 2014
|