2018
DOI: 10.14569/ijacsa.2018.090350
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Detection and Elimination Mechanism from Cooperative Black Hole Threats in MANETs

Abstract: Malicious node invasion as black hole attack is a burning issue in MANETs. Black hole attacks with a single malicious node is easy to detect and prevent. The collaborative attacks with multiple cooperative malicious node is a challenging issue in security of MANETs as it is difficult to figure out due to its complex and sophisticated mechanism. This study proposed a novel signature-based technique to detect and handle the cooperative black hole attack in MANETs. For this purpose, diverse type of simulation sce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…According to the authors, this method generates an additional overhead due to the acknowledgments exchanged between the source and the intermediate nodes. In [25], Khan et al have proposed an algorithm makes use of the sequence number to identify the black hole nodes. A node is considered as a malicious node if its sequence number does not lie between the minimum and maximum of the specified sequence numbers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the authors, this method generates an additional overhead due to the acknowledgments exchanged between the source and the intermediate nodes. In [25], Khan et al have proposed an algorithm makes use of the sequence number to identify the black hole nodes. A node is considered as a malicious node if its sequence number does not lie between the minimum and maximum of the specified sequence numbers.…”
Section: Related Workmentioning
confidence: 99%
“…The concept of extended DRI table is used to detect and eliminate the malicious black hole nodes. The main drawback of the proposed approach is the packet drop due to high end-to-end delay [25]. In [16], Sathish et al have proposed two security solutions against the black hole attacks to detect single and collaborative black hole attacks.…”
Section: Related Workmentioning
confidence: 99%