Generalized Black Hole Attack and Comparative Solution For MANET
Shanu Singh1, Amit Kumar Pandey2, Minu Rani3

1Ms Shanu Singh, Department Of Computer Science & Technology, Gurgaon Institute of Technology & Management, Gurgaon, India.
2Mr. Amit Kumar Pandey, Department of Electronics and Communication Engineering, Skyline Institute Of Engineering and Technology, Greater Noida, India.
3Ms. Minu Rani, Department Of Computer Science & Engineering, SPGITM, Rewari, India.

Manuscript received on June 11, 2013. | Revised Manuscript received on June 15, 2013. | Manuscript published on June 25, 2013. | PP: 71-75 | Volume-1 Issue-8, June 2013. | Retrieval Number:  H0354061813/2013©BEIESP

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: MANET is widely used by defense and civilians for wide range of application. There are various applications in wide range of communication. It’s various routing technique makes it more flexible for various operations. Mobile Ad-Hoc network which leads to an autonomous system, where station or nodes are connected with each other through air medium links. There is no boundary conditions on the nodes to join or leave the network, therefore the overall operation is being freely. MANET topology is dynamic that can change rapidly because the nodes move freely and it can organize themselves randomly. Such a property of the nodes makes the mobile Ad-Hoc networks unpredictable from the point of view of topology and scalability . In this paper we fetch the various attacks on MANET and compare the technique to various solutions of MANET infrastructure which does not posses attacks. This paper also contains the protocol which leads to protect the MANET by attacks.
Keywords: MANET, DSDV, DRI, Cross Checking, AODV