2011
DOI: 10.1186/2192-1962-1-4
|View full text |Cite
|
Sign up to set email alerts
|

A survey of black hole attacks in wireless mobile ad hoc networks

Abstract: The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the existing solutions and discuss the state-of-the-art routing methods. We not only classify these proposals into single black hole attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
120
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 199 publications
(121 citation statements)
references
References 27 publications
0
120
0
1
Order By: Relevance
“…In addition, our model is lightweight because it maintains a hierarchy only for nodes on active routes. [3]On theother hand, existing hierarchical routing protocols such as CGSR and ZRP maintain hierarchies for the entire network. We present aninstantiation of WPR, where we use DSR as the intersegment routing protocol and AODV as the intrasegment routing protocol.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, our model is lightweight because it maintains a hierarchy only for nodes on active routes. [3]On theother hand, existing hierarchical routing protocols such as CGSR and ZRP maintain hierarchies for the entire network. We present aninstantiation of WPR, where we use DSR as the intersegment routing protocol and AODV as the intrasegment routing protocol.…”
Section: Related Workmentioning
confidence: 99%
“…[5] Bidirectional links are discovered by sending a neighbor discovery packet (BND from end to end a node to all its neighbors. [3] This packet is used by nodes to create a bidirectional neighbor table BN Adding nodes is shown in Figure 4.…”
Section: Vlvc Algorithmmentioning
confidence: 99%
“…With respect to the routing strategy, one-hop broadcast has been chosen. As this is the most basic dissemination strategy (as there is no forwarding between nodes), it avoids delays caused by a routing strategy such as [18] or its associated threats like black hole attacks [19].…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…Security [3,18] is one of most important issues in various computing environments. Multiple security holes have been found in different Android components [15,20].…”
Section: Repackaging Vulnerabilitymentioning
confidence: 99%