2017
DOI: 10.24297/ijct.v16i1.5728
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced AODV Protocol for Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network

Abstract: Mobile Ad-hoc Network (MANET) is a kind of wireless network that has the most challenging network infrastructure. It is formed using the mobile nodes without any centralized administration from the security perspective and is a self-configuring fastest emerging wireless technology, each node on the MANET will act like a router which forwards the packets. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among a pair of nodes. Dynamic Source Routing (D… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Detection is much more important in case of any security threat to protect the hosts [24][25][26][27] from being a victim of ARP spoofing as it leads to many serious attacks on the network. 8 Therefore a detection mechanism [24][25][26][27] is the best solution before considering a prevention mechanism. 8 There are many tools released to detect ARP poisoning attacks in the LAN such as 20 : ARPwner, Ettercap, Window ARP spoofed, and other tools.…”
Section: Detection Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…Detection is much more important in case of any security threat to protect the hosts [24][25][26][27] from being a victim of ARP spoofing as it leads to many serious attacks on the network. 8 Therefore a detection mechanism [24][25][26][27] is the best solution before considering a prevention mechanism. 8 There are many tools released to detect ARP poisoning attacks in the LAN such as 20 : ARPwner, Ettercap, Window ARP spoofed, and other tools.…”
Section: Detection Approachmentioning
confidence: 99%
“…There are two types of countermeasures: detection systems and prevention systems. Detection systems detect the attack by sounding an alarm when an attack is detected, while the prevention system tries to prevent the attack from occurring . For best security measures, both detection and prevention systems should be implemented in the network ,…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation