Skip to main navigation Skip to search Skip to main content

Blackhole attack implementation in AODV routing protocol

Research output: Contribution to journalArticlepeer-review

Abstract

Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. Because of security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. One of the attacks is the Black Hole Attack against network integrity in this all data packets are absorbed by malicious nodes. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper we see how to implement black hole attack in Ad hoc On demand Distance Vector protocol using network simulator 2.34
Original languageEnglish
Pages (from-to)402-406
JournalInternational Journal of Scientific and Technology Research
Volume4
Issue number5
Publication statusPublished - 1 May 2013

Fingerprint

Dive into the research topics of 'Blackhole attack implementation in AODV routing protocol'. Together they form a unique fingerprint.

Cite this