2010
DOI: 10.1007/978-3-642-12214-9_36
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Security Approach for Detecting Black Hole Attack in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(19 citation statements)
references
References 2 publications
0
19
0
Order By: Relevance
“…The main problem of the aforementioned approach is it fails when a malicious sensor succeeds in changing its behavior continuously. Other researchers used Bayesian detection scheme, while others used approach that is based on modifying the ad hoc on‐demand distance vector routing protocol . Malicious sensors detection using the existing approaches require high usability of sensors resources such as the processing power, RAM, and the storage, especially in highly moving sensors across large graphical areas.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The main problem of the aforementioned approach is it fails when a malicious sensor succeeds in changing its behavior continuously. Other researchers used Bayesian detection scheme, while others used approach that is based on modifying the ad hoc on‐demand distance vector routing protocol . Malicious sensors detection using the existing approaches require high usability of sensors resources such as the processing power, RAM, and the storage, especially in highly moving sensors across large graphical areas.…”
Section: Related Workmentioning
confidence: 99%
“…Other researchers used Bayesian detection scheme, 23 while others used approach that is based on modifying the ad hoc on-demand distance vector routing protocol. [24][25][26][27] Malicious sensors detection using the existing approaches require high usability of sensors resources such as the processing power, RAM, and the storage, especially in highly moving sensors across large graphical areas. Keeping tables that store information about neighbor sensors, sent packets, received packets, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Many proposals in the literature have been dealing with detecting and/or avoiding malicious blackhole nodes in MANETs [3][4][5][6][7][8][9]. Representative ones are as follows.…”
Section: Related Workmentioning
confidence: 99%
“…This study deals with one of the security problems in ad hoc networks called black hole problem (Jaisankar et al, 2010). The black hole generally exhibits itself as the node which has the shortest path to the destination node and sends its reply as early as possible than all other original nodes thereby the source node assumes this fake node as the path to destination and sends all its packets which are all drained into the fake node making an empty hollow.…”
Section: Introductionmentioning
confidence: 99%