![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
HBRA-Hedge Way for Black Hole Attack in Mobile Ad-Hoc Networks
Subscribe/Renew Journal
Security is the essential requirement in wireless ad-hoc networks to provide the protected communication between the nodes. The fact that the mobile ad-hoc networks are the lack of fixed infrastructure and use the wireless links for communications to make them very susceptible to an adversary‟s malicious attacks. Due to this feature of freedom and unconstrained mobility, it is prone to many security related problems. One of the problem in ad-hoc network is a black hole attack and it is easily employed by exploiting vulnerability of ad-hoc networks. In black hole attack, the attacker‟s node will always have the availability in replying to the route request and thus intercept the data packet and then retain it. In this paper, we address the problem of packet forwarding misbehavior and present a new technique HBR to detect and remove the black hole attack using NBT(Next Bounds Table), RQCT (Request connection table) and RSCT (Response connection table) Tables. This technique gives the better solution to improve the overall performance of the network and isolates the black hole attack from the network. And also it identifies the correct path to transmit the data packets safely.
Keywords
Ad-Hoc, Black Hole Attack, Routing Packets, Security.
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 246
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 5