2013
DOI: 10.1007/978-3-642-31552-7_38
|View full text |Cite
|
Sign up to set email alerts
|

Securing Data from Black Hole Attack Using AODV Routing for Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…In literature many black hole detection and/or elimination schemes have been presented. Authors in [12] presented an approach based on multi-path packet sending. In this approach, packets are divided to some sub-packets and then each sub-packet is sent through a random path to the destination.…”
Section: Related Workmentioning
confidence: 99%
“…In literature many black hole detection and/or elimination schemes have been presented. Authors in [12] presented an approach based on multi-path packet sending. In this approach, packets are divided to some sub-packets and then each sub-packet is sent through a random path to the destination.…”
Section: Related Workmentioning
confidence: 99%
“…In the first scenario, we evaluate the effectiveness of ECPDR against black hole attack ( Kamatchi et al, 2013) on reactive routing AODV using the simulator Ns-2 (Information Sciences Institute, 2007) configured with the standard IEEE 802.11 (11 Mbps and 2 Mbps were used to transmit unicast and broadcast traffic, respectively). We generated a number of random topologies with N nodes on a square field, where N is between 30 to 80 square field size varies of 600x600m to 1500x1500m depending on the size of ADSocial.…”
Section: Scenariomentioning
confidence: 99%
“…Besides, the suspected node blocks the transfer of packets to the target node. Typically, the block-hole node enters in AODV protocol by defining itself as a genuine route for the target to initiate the acceptance of packets from the genuine nodes and rejects the packets having the valued data [8][9]. Likewise, the gray-hole node forwards the data comparable to the typical nodes.…”
Section: Introductionmentioning
confidence: 99%