2015
DOI: 10.1155/2015/715820
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

Abstract: The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Cryptographic hashes and threshold models are used in the identification of assaults. M.Rajesh Babu, et al (2015) presented a proactive alleviation of BH attack in MANETs. In general, MANET is defenseless against network attacks, especially BH attack, while its variants can harm the whole MANET framework.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptographic hashes and threshold models are used in the identification of assaults. M.Rajesh Babu, et al (2015) presented a proactive alleviation of BH attack in MANETs. In general, MANET is defenseless against network attacks, especially BH attack, while its variants can harm the whole MANET framework.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequently, the source node is tricked by fraudulent routing path packet and disseminates the information along the path in network. In response to this, the BH node drops the packets instead of disseminating the information [4]. Nodes are assessed through trust measures and its levels [5].…”
Section: Introductionmentioning
confidence: 99%
“…In this process, a Key allocation is processed in a non-centric way. However, the prime focus of this approach is the lack of effective localized perception because the node regions are randomly deployed The work of Babu et al [16] focuses on the severity of black-hole attacks in the MANET. A novel and secure framework are presented based on a timely updated node status procedure to detect a compromised node and to eliminate that node.…”
Section: Literature Surveymentioning
confidence: 99%
“…So black hole nodes are skipped in the routing. Authors in [4] proposed a method to detect and alleviate from cooperative black hole attack. The detection of black hole is based on absence of consistent acknowledgement for the packets.…”
Section: Related Workmentioning
confidence: 99%