Enhancement in Elimination of Security Threads using Trusted Proactive Routing

Shilpa Jaiswal
2013 IOSR Journal of Computer Engineering  
Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible that eventually a malicious node becomes easy to deploy in ad hoc n/w and they cause among other impact performance degradation. One attack that can deploy by malicious node is black hole attack. This paper reviews the problem of occurrence of black hole attack and its solution technique
more » ... proposed enhancement in proactive routing protocol Destination Sequenced Distance Vector Routing protocol Using trust based and hop count method.
doi:10.9790/0661-0938288 fatcat:3byhwrpm35ftxlvjw3bu76s66e