2013
DOI: 10.1002/sec.766
|View full text |Cite
|
Sign up to set email alerts
|

A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks

Abstract: A mobile ad hoc network is a collection of mobiles, autonomous nodes that communicate in a cooperative manner over a wireless channel without any fixed infrastructure, nor built‐in security. As such, this type of network is vulnerable to different types of attacks such as blackhole and wormhole attacks. A blackhole attack is a type of attack where the malicious node (so‐called blackhole node) can attract all the data packets by using a forged route reply packet to falsely claim that it has a shortest route to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…A MANET can either be a standalone entity or it can be an extension of a wired network. There are many application areas of MANETs, such as:  Open  Closed An open MANET comprises of different users, having different goals, sharing their resources to achieve global connectivity, as in civilian applications [1][2][3][4].…”
Section: Characteristics Of Manetsmentioning
confidence: 99%
See 1 more Smart Citation
“…A MANET can either be a standalone entity or it can be an extension of a wired network. There are many application areas of MANETs, such as:  Open  Closed An open MANET comprises of different users, having different goals, sharing their resources to achieve global connectivity, as in civilian applications [1][2][3][4].…”
Section: Characteristics Of Manetsmentioning
confidence: 99%
“…Mobile Ad Hoc Network (MANET) can be described as an autonomous collection of mobile nodes (users) that communicate over relatively low capacity wireless links, without a centralized infrastructure [1,2]. In these networks, nodal mobility and the wireless communication links may lead to dynamically changing and highly unpredictable topologies.…”
Section: Introductionmentioning
confidence: 99%
“…Woungang et al . extended DSR protocol and proposed a new protocol, called detecting blackhole attack based on DSR. The main contribution in detecting blackhole attack based on DSR is to find nodes participating in blackhole attacks prior to the route discovery phase.…”
Section: Related Workmentioning
confidence: 99%
“…This phenomenon necessitates a routing protocol that can find more stable and qualified routes to the destination. There is an ongoing research on routing protocols aimed to enhance the security of MANETs by improving existent security schemes or proposing new security schemes . In this way, it is necessary to find a trade‐off between performance and security of a MANET.…”
Section: Introductionmentioning
confidence: 99%
“…This type of attack is done by changing some of the control information or metrics of routing. Impersonation is another type of attack wherein malicious node use identity belonging to other nodes to initiate attacks [20][21][22]. There are different security mechanisms to address the malicious or adversarial nodes [23]: a) Preventive Mechanism This mechanism works as a defense technique by applying encryption and authentication schemes.…”
Section: Introductionmentioning
confidence: 99%