2016
DOI: 10.1016/j.jpdc.2015.10.006
|View full text |Cite
|
Sign up to set email alerts
|

Black hole search in computer networks: State-of-the-art, challenges and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 58 publications
0
7
0
Order By: Relevance
“…In addition, the proposed have faith prediction mannequin is introduced to the supply routing process. Provides a exible, viable method to a novel technological know-how referred to as trust-based supply routing protocol [6] end-to-end latency through making increased use of fake node detection and assault resistance. The writer focuses on the loss-Black Hole attack approach, which calculates the node's intangible cost relative to the sum of the extraordinary distinction between Route Request and Route Repeat sending by node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, the proposed have faith prediction mannequin is introduced to the supply routing process. Provides a exible, viable method to a novel technological know-how referred to as trust-based supply routing protocol [6] end-to-end latency through making increased use of fake node detection and assault resistance. The writer focuses on the loss-Black Hole attack approach, which calculates the node's intangible cost relative to the sum of the extraordinary distinction between Route Request and Route Repeat sending by node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Wireless networks have many different architectures than that of a typical wired network; a host can broadcast that it has the shortest path towards a destination. By doing this, all traffic will be directed to the host that has been compromised, and the host can drop packets at will [6]. Also over a mobile ad-hoc network, hosts are especially vulnerable to collaborative attacks where multiple hosts will become compromised and deceive the other hosts on the network [7].…”
Section: Introductionmentioning
confidence: 99%
“…Both active and passive form of attacks is possible in MANET. Various active forms of attack involve Blackhole attack [10], co-operative Blackhole attack [11], Grayhole attack [12], wormhole attack [13], Sybil attack [14], DOS [15] and D-DOS attack [9], rushing attack [16], etc. While passive form of attack involves tapping of data on an insecure link and eavesdropping.…”
Section: Introductionmentioning
confidence: 99%