Академический Документы
Профессиональный Документы
Культура Документы
Denial of Service
Impersonation
Energy Consumption
Information Disclosure
Black Hole Attack in AODV
As shown in Fig. 1 any intermediate node having
fresh enough route to destination node can reply to
Route request(RREQ) sent by source node.
Hence taking advantage of this a malicious node send
In this way all the black nodes are detected and every
node is having list of such malicious nodes so if they
get any RREP from such malicious node then they just
drop it. And Hence can avoid the Attack.
Conclusion