2015
DOI: 10.14257/ijfgcn.2015.8.4.28
|View full text |Cite
|
Sign up to set email alerts
|

A Review: Black Hole and Gray Hole Attack in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
1

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
1
0
1
Order By: Relevance
“…The malicious nodes can perform packet modification attacks [26], black hole and grey hole attacks [27] with all or some packet ejection, and energy depletion [28,29]. When simulation starts, all nodes in the WSN consider each other a legitimate one.…”
Section: Resultsmentioning
confidence: 99%
“…The malicious nodes can perform packet modification attacks [26], black hole and grey hole attacks [27] with all or some packet ejection, and energy depletion [28,29]. When simulation starts, all nodes in the WSN consider each other a legitimate one.…”
Section: Resultsmentioning
confidence: 99%
“…Di dalam serangan black hole pada jaringan MANET, protokol routing digunakan menyatakan dirinya ke node perantara lainnya sebagai node yang memiliki rute terpendek ke node tujuan [9]. Setelah menerima pesan RREQ dari node, node black hole dapat memalsukan pesan RREP seolah-olah memiliki rute yang cukup fresh ke node tujuan.…”
Section: Serangan Black Holeunclassified
“…The black-and gray-hole attacks are also known as sequence number attacks. Many approaches have been designed and suggested to identify and mitigate these kinds of attacks in MANETs [11]. Though these approaches mitigate malicious activities, still the routing security has less efficiency.…”
Section: Introductionmentioning
confidence: 99%