2021
DOI: 10.1155/2021/6693316
|View full text |Cite
|
Sign up to set email alerts
|

Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature

Abstract: In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly, where there is no central administration. They are prone to different types of attacks such as the black hole, insider, gray hole, wormhole, faulty node, and packet drop, which considerably interrupt to perform secure communication. This paper has implemented the denial-of-service attacks like black hole attacks on general-purpose ad hoc on-demand distance vector (AODV) protocol. It uses three approaches: normal AODV, bla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…This scheme only concentrates with black hole attacks. 33 Then a cluster-based routing secure scheme is proposed to provide trust detection of attacks. This method is only possible to detect internal attackers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This scheme only concentrates with black hole attacks. 33 Then a cluster-based routing secure scheme is proposed to provide trust detection of attacks. This method is only possible to detect internal attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Comparison with the performance improvements of various research schemes gives an insight that using AODV detection method black hole attacks are detected and make the communication between nodes reliable. This scheme only concentrates with black hole attacks 33 . Then a cluster‐based routing secure scheme is proposed to provide trust detection of attacks.…”
Section: Related Workmentioning
confidence: 99%
“…𝜂: In mobile ad-hoc networks, the end-to-end delay criterion refers to the time it takes for data packets along the entire network to reach the destination node from the source node. [31][32][33][34] Delay is calculated as Equation ( 7):…”
Section: Performance Metricsmentioning
confidence: 99%
“…The other Cuckoo search and M-tree-based approach were proposed by Babu and Ussenaiah (14) to enhance the Adhoc network's performance. The other heuristic and metaheuristic approaches based on an optimization algorithm were developed by several researchers (15)(16)(17)(18)(19)(20)(21)(22)(23)(24)(25)(26)(27)(28) that optimize the network's performance and provide a secure communication environment.…”
Section: Related Workmentioning
confidence: 99%