2019
DOI: 10.1007/s11276-019-01966-z
|View full text |Cite
|
Sign up to set email alerts
|

A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability

Abstract: Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless network in which the mobile nodes operate in a distributed manner and collaborate with each other in order to provide the multi-hop communication between the source and the destination node. Generally, the main assumption considered in the MANET is that each node is a trusted node. However, in a real scenario, there are some unreliable nodes which misbehave and launch the attack in network like blackhole in which the misbehaving nodes attr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(20 citation statements)
references
References 48 publications
0
20
0
Order By: Relevance
“…[ 10 ] Here we have tried to show the nodes which are seen in the mole ad hoc network. They have been further divided into various classes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[ 10 ] Here we have tried to show the nodes which are seen in the mole ad hoc network. They have been further divided into various classes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Narayanan et al [6] proposed a methodology which uses improved security components so it fulfills the primary security prerequisite and ensures the revelation of a right and secured route. Gurung et al [7] have proposed to build up an energy proficient secure routing method. Sirisala et al [8] have presented the on-request routing conventions AODV, DSR on IEEE 802.11 and the trademark of these routing methodologies are displayed.…”
Section: Literature Surveymentioning
confidence: 99%
“…In MANETs there is no central administrator to deal with nodes and the communication problems [7]. In this manner nodes need to coordinate for the successful data transmission.…”
Section: Introductionmentioning
confidence: 99%
“…Every node in the system has a particular prime number which goes about as node Identity and this character must not be changed. Thereafter, a novel technique depicted in the paper [5] called source routing discovery for preventing the black-hole attack (SRD-AODV) technique. Further, the researchers characterize the Threshold, least and most extreme number of nodes on the system.…”
Section: Related Workmentioning
confidence: 99%
“…An Ad-Hoc Network is very useful on disaster recovery, military operations, smart building and so on due to some characteristic such as decentralized, dynamic topology, self-configuration, lack of infrastructure, selforganization, maintenance, quick deployment. WMANET is groups of wireless mobile devices where each device works as host with a router itself [5]. WMANET is an asset of mobile devices which may communicate with every node without whichever centralized system.…”
Section: Introductionmentioning
confidence: 99%