2018 Third International Conference on Fog and Mobile Edge Computing (FMEC) 2018
DOI: 10.1109/fmec.2018.8364068
|View full text |Cite
|
Sign up to set email alerts
|

Detection and prevention of Black Hole Attacks in IOT & WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…Blackhole attacks carry out malicious actions such as creating a high rate of packet loss, packet overhead and depleting the IoT nodes' limited resources [13]. The stability of RPL network will be affected due to changes of node ranks and increase of network latency due to blackhole attack by the malicious node.…”
Section: Blackhole Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Blackhole attacks carry out malicious actions such as creating a high rate of packet loss, packet overhead and depleting the IoT nodes' limited resources [13]. The stability of RPL network will be affected due to changes of node ranks and increase of network latency due to blackhole attack by the malicious node.…”
Section: Blackhole Attackmentioning
confidence: 99%
“…However, RPL-based networks are vulnerable to a massive security vulnerabilities due to their limited nature [11], [12]. The most dangerous attack in IoT implementation is the blackhole attack, which is regarded as one of the most dangerous and a point of entry for all other attacks [13]. Furthermore, it is also one of the lethal RPL attacks, initiated when a rogue node secretly loses all packets that it is intended to be transmitted [14], causing massive energy losses, congestion, and network overhead issues.…”
Section: Introductionmentioning
confidence: 99%
“…Kim et al, [19] they proposed a flooding detection method using encounter record data to separate flooding attacks from legal burst transmission in delay tolerant networks [47] [48]. Nevertheless, using digital signatures and exchanging encounter information among nodes results in a large network overhead and power expenditure [34] [35]. The authors Tsiota et al, in [20] they proposed that several techniques have been implemented as a corrective to a flooding assault security worthy based scheme, FAP scheme, and effective filtering approach.…”
Section: Related Workmentioning
confidence: 99%
“…Such an attack poses a threat to confidentiality, integrity and availability. The blackhole attack is a paradigmatic example of selective forwarding, where the assailant will conduct a DoS, avoiding the routing of all packets to the network [148]. A "sinkhole attack" is realized by hackers in order to direct most of the network traffic to them.…”
Section: Network Layer Attacksmentioning
confidence: 99%