S Dhama, S Sharma, M Saini - 2016 3rd International …, 2016 - ieeexplore.ieee.org
… BH attack in the mobile ad hoc network. The routing protocol that we are using is Ad hoc on-…
As we know that AODV is vulnerable to BH attack, where a node pretends as a shortest path …