2010
DOI: 10.5120/1292-1766
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhanced DSR protocol to prevent Black hole attacks in MANETs

Abstract: The dynamic changing nature of network topology makes any node in MANET to leave and join the network at any point of time. There are many routing protocols that establish the routes between the nodes in the network. The control towards the management of the nodes in the MANET is distributed. This feature does not give assurance towards the security aspects of the network. There are many routing attacks caused due to lack of security. The routing attack addressed in this paper is the black hole attack. The Bla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 7 publications
(5 reference statements)
0
9
0
Order By: Relevance
“…One of the most common attacks experienced in the MANET is the black hole attack. Selvavinayaki and Karthikeyan [4] had addresses certain solutions that were security-oriented in order to prevent black hole attacks with digital certificates that could authenticate routes at the time of route discovery. The authentication of digital certificates can avoid black hole nodes during route discovery.…”
Section: Literature Surveymentioning
confidence: 99%
“…One of the most common attacks experienced in the MANET is the black hole attack. Selvavinayaki and Karthikeyan [4] had addresses certain solutions that were security-oriented in order to prevent black hole attacks with digital certificates that could authenticate routes at the time of route discovery. The authentication of digital certificates can avoid black hole nodes during route discovery.…”
Section: Literature Surveymentioning
confidence: 99%
“…The digital signature is a self organized and PKI authenticated by a chain of nodes without the use of a trusted third party [5]. It is further dependent on consistency, effectiveness and reliability of the mechanism used.…”
Section: Mechanismmentioning
confidence: 99%
“…Moreover, the one‐way key chain generated by TESLA does not fit into the memory of a traditional sensor node. The derived version, named μTESLA, provides authenticated streaming broadcast for WSN. Many secured versions of AODV have been developed as in Fang et al and Tobarra et al, and many enhanced versions of μTESLA have been developed .…”
Section: Introductionmentioning
confidence: 99%