Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
Cloud Computing: Issues and Challenges
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
An efficient broker cloud management system
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Hi-index | 0.00 |
Cloud Network is very broad and unreliable due to its property of elasticity in number of VM and physical nodes in its Virtual Cloud Network (VCN). Nodes can join and withdraw the network at any time. Elasticity is the advantage of cloud computing but it comes with lots of security issues in routing and data forwarding in between packets. VCN working is very much similar to Mobile Ad-Hoc Networks (MANETs) which rely on the cooperation of all participating nodes to provide the fundamental operations. Due to non centralized security in VCN and MANET, lots of security attacks and threats are all in the way to exploit security of data routing. Malicious node may intervene and can exploit the data during wireless communication. Different protocols have different impact of such attacks of malicious nodes. In this paper Comparative analysis of Black Hole attack for both Proactive and Reactive protocol is taken into account. The impact of Black Hole attack on the performance of VCN as well as MANET is evaluated and finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols.