Research Article
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Table 1
Vulnerability analysis of routing protocols.
| |||||||||||||||||||||||||||||||||
Effective: avoids or allows negligible damage. Versatile: allows attack only to do a partial damage. Ineffective: allows the attack to meet out considerable or full damage. |