2018
DOI: 10.1007/978-981-10-8204-7_32
|View full text |Cite
|
Sign up to set email alerts
|

ESMBCRT: Enhance Security to MANETs Against Black Hole Attack Using MCR Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…In this type of attack, a node simulate itself as the shortest path of network and collect all the data that were sent to original node. By sending the fake replies it can at as spy node and can create the denial of service attack [27]. Black Hole Attack can be distributed into two types of attacks (i) Single hub attack, in which a single node starts dropping the packet; (ii) Multiple hubs becomes the malicious nodes and starts to drop the data packets known as Gray Hole attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this type of attack, a node simulate itself as the shortest path of network and collect all the data that were sent to original node. By sending the fake replies it can at as spy node and can create the denial of service attack [27]. Black Hole Attack can be distributed into two types of attacks (i) Single hub attack, in which a single node starts dropping the packet; (ii) Multiple hubs becomes the malicious nodes and starts to drop the data packets known as Gray Hole attack.…”
Section: Related Workmentioning
confidence: 99%
“…By attacking, the attacker can use any hub, to make it a malicious hub, this malicious hub can spy the data and send it to the attacker and stop sending the packets towards its destination path [2]. Numerous systems are proposed to stay away from and recognize the Black Hole Attack [27]. For…”
Section: Related Workmentioning
confidence: 99%
“…There is already enough research regarding black hole attack using AODV protocol [4,5]. But still, preventing algorithms are developed using the defined protocol and different techniques were implemented to determine the black hole attack [6,7]. Some researchers focussed on detecting and mitigating the wormhole attack while transmitting and propagating the data [8].…”
Section: Literature Surveymentioning
confidence: 99%
“…S. N. Mohammad et. alhas used the Micr technique to enhance the security level [9]. The network has been secured from the black hole attack using a key distribution system, which provides improved security level to the MANET.…”
Section: Related Workmentioning
confidence: 99%