Visible to the public Prevention Techniques Employed in Wireless Ad-Hoc Networks

TitlePrevention Techniques Employed in Wireless Ad-Hoc Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsTomar, Ravi, Awasthi, Yogesh
Conference Name2019 International Conference on Advanced Science and Engineering (ICOASE)
Date Publishedapr
KeywordsAd hoc networks, Ad-hoc wireless networks, Artificial Bee Colony, Black hole attack, Communication system security, compositionality, fabrication, genetic algorithm, MANET, manet attack prevention, Metrics, optimisation, pubcrawl, resilience, Resiliency, Routing, telecommunication network routing, telecommunication security, VANET, vehicular ad hoc networks, Wireless Ad-Hoc Networks, Wireless communication, Wireless sensor networks
AbstractThe paper emphasizes the various aspects of ad-hoc networks. The different types of attacks that affect the system and are prevented by various algorithms mentioned in this paper. Since Ad-hoc wireless networks have no infrastructure and are always unreliable therefore they are subject to many attacks. The black hole attack is seen as one of the dangerous attacks of them. In this attack the malicious node usually absorbs each data packets that are similar to separate holes in everything. Likewise all packets in the network are dropped. For this reason various prevention measures should be employed in the form of routing finding first then the optimization followed by the classification.
DOI10.1109/ICOASE.2019.8723725
Citation Keytomar_prevention_2019