2016
DOI: 10.1007/s11277-016-3318-5
|View full text |Cite
|
Sign up to set email alerts
|

Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks

Abstract: Mobile ad hoc networks (MANETs) are wireless infrastructure-less network consisting collection of autonomous nodes that communicate with each other in decentralized manner. Security remains major challenge due to its some unique characteristics like open medium, mobility and hence topology changes. Therefore, routing protocol for MANETs is much vulnerable to attacks. Black Hole is a type of attack, where malicious node falsely advertises itself having the shortest or optimal path to the destination node. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(29 citation statements)
references
References 14 publications
0
29
0
Order By: Relevance
“…The fitness function for PSO considers inter node distance and nodal power. Security against routing attacks is studied in [20]. The work proposed an algorithm to detect cooperative black hole attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The fitness function for PSO considers inter node distance and nodal power. Security against routing attacks is studied in [20]. The work proposed an algorithm to detect cooperative black hole attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Tree topology is used in the sensor network in which entire network is divided into clusters wherein each cluster is treated as a leaf of a tree and cluster head is identified as a parent of the cluster. Malicious node detection mechanism in wireless sensor network can be evaluated depending upon the individual node's trustworthiness [9,11,15,17]. Generally, each sensor node is responsible for trust evaluation based on monitoring its neighbor node's behavior.…”
Section: Fig 1 Hierarchical Cluster Topology In Wirelessmentioning
confidence: 99%
“…In a black hole attack [46][47][48] the intruder impersonates a node and blocks or drops the messages upon receiving them. In the SMSN, the sensor and user nodes can connect to multiple sink nodes simultaneously; hence, failure of data exchange on one route does not block the data delivery towards the base station.…”
Section: Black Hole Attackmentioning
confidence: 99%