Loading

Co-operative and Threshold Detection Method and Proposed Algorithm for Black Hole Attack
Shanu Singh1, Shikha Chandana2, Amit Kumar Pandey3
1Ms Shanu Singh, Department Of Computer Science & Technology, Gurgaon Institute of Technology & Management, Gurgaon, India.
2Ms. Shikha Chandana, Department Of Computer Science & Technology, Gurgaon Institute of Technology & Management, Gurgaon, India.
3Mr. Amit Kumar Pandey, Department of Electronics and Communication Engineering, Skyline Institute Of Engineering and Technology, Greater Noida, India.
Manuscript received on May 22, 2013. | Revised Manuscript received on June 10, 2013. | Manuscript published on June 30, 2013. | PP: 391-395 | Volume-2, Issue-5, June 2013. | Retrieval Number: E1871062513/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: To avail the prospective of wireless communication now days, the complete communication should be flexible and supportive to various architectures. Now a days various prospective has been proposed to achieve the flexibility and minimize the losses. Various routing protocols has been proposed in case of Mobile and ad-hoc networks. Various optimized link and nodes for routing is insisted in this paper. This paper comes with a complete comparative study of various routing protocol, security issue and physical layers . In this paper an approach has been proposed for Black Hole Removal using Threshold and Co-operative Method. Co-operative detection method has been also proposed to identify the proper step. Over all this paper contains a comparative routing protocol and study of various security issue physical layer and proposed algorithm for co-operative detection method of Black hole Attack.
Keywords: Routing protocol, Security issue, Physical layers, co-operative detection.