2009 International Symposium on Autonomous Decentralized Systems 2009
DOI: 10.1109/isads.2009.5207339
|View full text |Cite
|
Sign up to set email alerts
|

Proposal of a method to detect black hole attack in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…The black hole attack problem in mobile ad hoc networks and WSNs has been addressed in several works, including Refs [4,5,7]. Some researchers have provided a solution for the single black hole attack problem, others for the colluding black hole attack problem.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The black hole attack problem in mobile ad hoc networks and WSNs has been addressed in several works, including Refs [4,5,7]. Some researchers have provided a solution for the single black hole attack problem, others for the colluding black hole attack problem.…”
Section: Related Workmentioning
confidence: 99%
“…Only a small number of methods have been proposed to address single and colluding black hole attacks. Two-step approaches that use judgment and verification processes were proposed to detect black hole attack in Refs [7,8]. However, to the best of our knowledge, there has been no research to address the black hole attack problem in RPL.…”
Section: Introductionmentioning
confidence: 99%
“…In our opinion, considering the dynamic environment of MANETs, such mechanisms based on fixed thresholds to detect black hole attacks suffer from high false alarm rates since they have no means to adapt to changes caused by node mobility. In [42] Zhang et al proposed a black hole detection scheme based on sequence number checking of the RREP packets. They considered a scenario where an intermediate node is an attacker and suggested that, whenever a node sends a RREP back to a source node, the intermediate node should also generate a request for a sequence number to the destination node.…”
Section: Protecting Against Black Hole Attacksmentioning
confidence: 99%
“…On the one hand, different entities located in different places and sharing information through the Internet form a Collaborative Intrusion Detection Network (CIDN) [29,30,5]. On the other hand, different wireless sensors monitoring a Mobile Ad-Hoc Network (MANET) [31,32] also constitute an IDN. The main difference between these two approaches is that while CIDNs are likely composed of well-equipped systems (i.e., having substantial memory and processing resources), MANETs are composed of resource-constrained nodes requiring lightweight detection algorithms.…”
Section: System Modelmentioning
confidence: 99%