Blackhole Attack Implementation in AODV Routing Protocol

Monika Roopak, B Reddy

Research output: Contribution to journalArticlepeer-review

Abstract

Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. Because of security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. One of the attacks is the Black Hole Attack against network integrity in this all data packets are absorbed by malicious nodes. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper we see how to implement black hole attack in Ad hoc On demand Distance Vector protocol using network simulator 2.34
Original languageEnglish
Pages (from-to)402-406
Number of pages5
JournalInternational Journal of Scientific and Technology Research
Volume4
Issue number5
Publication statusPublished - 1 May 2013
Externally publishedYes

Fingerprint

Dive into the research topics of 'Blackhole Attack Implementation in AODV Routing Protocol'. Together they form a unique fingerprint.

Cite this