2015
DOI: 10.17485/ijst/2015/v8i1/84653
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of MANETS under Black Hole Attack for Different Network Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The results show improved performance for the parameters false positive alarm, detection rate, packet delivery ratio, average end to end delay, routing overhead as compared to AODV with the black hole. Abhijit Deodhar and Ritesh Gujarathi [9] in their paper highlight the clustered approach as the single point of failure. This scheme protects from a situation where the cluster head is compromised.…”
Section: Literature Surveymentioning
confidence: 99%
“…The results show improved performance for the parameters false positive alarm, detection rate, packet delivery ratio, average end to end delay, routing overhead as compared to AODV with the black hole. Abhijit Deodhar and Ritesh Gujarathi [9] in their paper highlight the clustered approach as the single point of failure. This scheme protects from a situation where the cluster head is compromised.…”
Section: Literature Surveymentioning
confidence: 99%
“…The lake of a central unit in MANET makes this vulnerable for many attacks, in general, there are two categories of attack: passive and active attack [8]. The malicious node with passive attacks gets traffic information without authorization such as listening.…”
Section: Misbehavior Nodementioning
confidence: 99%
“…Due to the limitation power and mobility there is less sufficiency among them. In these wireless networks, the main things like confidentiality, availability authentication, anonymity, integrity to all the users of mobile communication [2]. There are many security attacks in MANET in which these are responsible for the failure in communication from source to destination.…”
Section: Related Studymentioning
confidence: 99%