2021
DOI: 10.1155/2021/8814141
|View full text |Cite
|
Sign up to set email alerts
|

Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks

Abstract: The characteristics of the mobile ad hoc network (MANET), such as no need for infrastructure, high speed in setting up the network, and no need for centralized management, have led to the increased popularity and application of this network in various fields. Security is one of the essential aspects of MANETs. Intrusion detection systems (IDSs) are one of the solutions used to ensure security in this network. Clustering-based IDSs are very popular in this network due to their features, such as proper scalabili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 37 publications
0
8
0
Order By: Relevance
“…Farahani 30 demonstrated a KNN based intrusion detection model to find the black hole attack in MANET. The cluster head was selected through fuzzy interference based on the remaining energy and reputation.…”
Section: Related Workmentioning
confidence: 99%
“…Farahani 30 demonstrated a KNN based intrusion detection model to find the black hole attack in MANET. The cluster head was selected through fuzzy interference based on the remaining energy and reputation.…”
Section: Related Workmentioning
confidence: 99%
“…An effective approach proposed in [ 6 ] was used to identify black-hole attacks with notable efficiency. The occurrence of a black-hole attack leads to notable enhancements in crucial network parameters such as TH, TND, NRL, PDR, and PLR.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Routing attacks manipulate the routing process to disrupt the accurate transmission of data, leading to network congestion, data loss, and possible denial of service. These attacks on the network layer come in several forms, such as flooding attacks, spoofing attacks, sybil attacks, black-hole attacks, gray-hole attacks, sink-hole attacks, and wormhole attacks [ 6 ]. Some of these types of attack are shown in Figure 1 .…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, Pandey and Singh [86] use SVM to detect nodes performing blackhole attack with 95% accuracy by observing their energy consumption. An unsupervised, clustering based anomaly detection is performed in the work of Farahani [87]. In this work k-NN model is implemented to identify fraud clusters in the latent space of nodes with high confidence.…”
Section: B Inter-vehicle Levelmentioning
confidence: 99%