Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/3007
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDave, Dhaval-
dc.contributor.authorDave, Pranav-
dc.date.accessioned2025-01-28T06:01:41Z-
dc.date.available2025-01-28T06:01:41Z-
dc.date.issued2015-
dc.identifier.citation10.1109/ICACCI.2014.6968417en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/3007-
dc.descriptionNITWen_US
dc.description.abstractWith the evolution of wireless technology and use of mobile devices, Mobile Ad-hoc Network has become popular among researchers to explore. A mobile ad-hoc network (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links. The routers and hosts are free to move randomly and organize themselves arbitrarily. It allows mobile nodes to communicate directly without any centralized coordinator. Such network scenarios cannot rely on centralized and organized connectivity, and can be conceived as applications of Mobile Ad-Hoc Networks. Thus, MANET is vulnerable due to its dynamic network topology, as any node become untrusted at any time. The Black hole attack is one kind of security risk in which malicious node advertises itself to have a shortest path for any destination, to forge data or for DOS attack. In this paper, to detect such nodes effectively, we propose a Permutation based Acknowledgement for most widely used reactive protocol ad-hoc on demand distance vector routing AODV. This mechanism is enhancement of Adaptive Acknowledgement (AACK) and TWO-ACK, here we have tried to show the efficiency increment by decreasing number of messages routed in the network.en_US
dc.language.isoenen_US
dc.publisherProceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014en_US
dc.subjectMANETen_US
dc.subjectBlack Holeen_US
dc.titleAn Effective Black Hole Attack Detection Mechanism using Permutation Based Acknowledgement in MANETen_US
dc.typeOtheren_US
Appears in Collections:Computer Science & Engineering



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.