EE Khin, T Phyu - … Journal of Information Technology, Modeling and …, 2014 - academia.edu
… AODV routing protocol. In Section 3, we discuss about the black hole attack. In Section 4, …
analysis of black hole attacks in AODV protocol. Finally, we conclude this paper in Section 5. …