2013
DOI: 10.5120/13437-1011
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Combat the Blackhole Attack in AODV Routing Protocol

Abstract: This article consists of a brief description of various issues on security of Ad hoc networks as well as counter work against Black Hole Attack. A Combat Approach against Black Hole Attack is truly based on Cooperation of individual nodes of MANET. In this Approach each individual node act as intrusion detection system and monitors each request that it receives to avoid the attack. For this we use the routing table as well as to authenticate the sender node. We use ns2 for implementation and to simulate the pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Also, it may be due to the simplicity of the routing protocol used to forward packets from one node to another, which is strictly required to maintain their connectivity over a wireless open medium in a distributed manner [9,39]. All these factors help attackers interrupt the network by, for example, transforming the routing protocol used to forward data to a central location (the "Sink") and interrupting network operations through mechanisms such as selective forwarding, data fabrication, or packet drops [37]. This will make other attacks against this specific form of ad hoc networking viable.…”
Section: Misbehavior Model For Wireless Sensor Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…Also, it may be due to the simplicity of the routing protocol used to forward packets from one node to another, which is strictly required to maintain their connectivity over a wireless open medium in a distributed manner [9,39]. All these factors help attackers interrupt the network by, for example, transforming the routing protocol used to forward data to a central location (the "Sink") and interrupting network operations through mechanisms such as selective forwarding, data fabrication, or packet drops [37]. This will make other attacks against this specific form of ad hoc networking viable.…”
Section: Misbehavior Model For Wireless Sensor Networkmentioning
confidence: 99%
“…So, specific security concerns that are absent in wired networks should be introduced in WSN [9]. Because of the simplicity of the routing protocol used to forward packets from one node to another, they must maintain distributed connectivity over a wireless open medium in a distributed manner [37,39]. Hence, the sensor node in the WSN is free to move independently in any direction.…”
Section: Maximum Lifetime Routing Dd Hierarchical Routingmentioning
confidence: 99%
See 1 more Smart Citation