z-logo
open-access-imgOpen Access
Ad Hoc On-demand Distance Vector Inherent Techniques Comparison for Detecting and Eliminating the Black Hole Attack Nodes in Mobile Ad Hoc Network
Author(s) -
Ghassan A. QasMarrogy,
Yazen S. Almashhadani
Publication year - 2020
Publication title -
cihan university-erbil scientific journal
Language(s) - English
Resource type - Journals
eISSN - 2707-6377
pISSN - 2519-6979
DOI - 10.24086/cuesj.v4n1y2020.pp77-81
Subject(s) - computer network , mobile ad hoc network , computer science , wireless ad hoc network , packet drop attack , optimized link state routing protocol , router , network packet , ad hoc wireless distribution service , node (physics) , vehicular ad hoc network , routing protocol , distance vector routing protocol , throughput , wireless , engineering , link state routing protocol , telecommunications , structural engineering
It is important to connect wirelessly a group of moving mobile nodes together in a static or dynamic form, to transfer digital data between them, this form known as a mobile ad hoc network. This private network can be used in different essential situations where it depends on each connected mobile node to deliver and pass the data between them, without any fixed access point or router. Unfortunately, there are different types of attacks that can affect these nodes, and steal or corrupt the data inside, one of these attacks called the black hole attack. In this paper, a compared study will be done between two major innovative techniques derived from the ad hoc on-demand distance vector routing protocol to avoid the black hole attack; the paper will compare the two techniques in delay, throughput and packet dropping efficacy.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here