作者
T Ananth Kumar, A Devi, N Padmapriya, S Jayalakshmi, P Divya
发表日期
2021
期刊
International Journal on Wireless, Networking & Mobile Communication Innovations [ISSN: 2581-5113 (online)]
卷号
5
期号
1
简介
DTN is vulnerable to the black hole and gray hole attacks due to its limited connectivity. A malicious node is identified during data transmission. However, the basic methodology captures all attacks made by individuals and does not obscure the path from source to destination. The AODV routing protocol is used to determine the smallest possible size of a data packet. Additionally, provide the shortest path to the destination node from the other neighboring road. We can access files and directories if changes to the system's network security occur due to hacking, misuse, or unauthorized access. It enables secure data transmission over a network without data loss. This article is a survey of techniques for detecting and preventing black/grey holes in DSR and AODV protocols.
引用总数
学术搜索中的文章
TA Kumar, A Devi, N Padmapriya, S Jayalakshmi… - International Journal on Wireless, Networking & Mobile …, 2021