International Conference on Computing, Communication &Amp; Automation 2015
DOI: 10.1109/ccaa.2015.7148439
|View full text |Cite
|
Sign up to set email alerts
|

An assessment based approach to detect black hole attack in MANET

Abstract: Nowadays MANETs has gained an esteemed popularity in networking. MANETs are self-organized, selfconfigured and self-administered networks. These unique characteristics make MANETs different from their hardwired counterparts and make susceptible to many security attacks. This paper observes the effects of Black hole attacks on the network performance. This paper also analyze three movement models of ONE simulator for mobility (shortest map based movement model, random-way point movement model and cluster moveme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Still some balancing technique is required to prevent the tree from becoming higher on one side resulting after a series of insertions and deletions [19] [20]. Ultimate goal is to maintain the tree in such way that its height is always O(lg(n)) so that all basic tree operations could be performed in O(lg(n)) time…”
Section: Resultsmentioning
confidence: 99%
“…Still some balancing technique is required to prevent the tree from becoming higher on one side resulting after a series of insertions and deletions [19] [20]. Ultimate goal is to maintain the tree in such way that its height is always O(lg(n)) so that all basic tree operations could be performed in O(lg(n)) time…”
Section: Resultsmentioning
confidence: 99%
“…al. [15] proposed solution for Black hole attack detection. Hint-based Probabilistic routing protocol is used to detect Black hole nodes.…”
Section: Recent Prevention and Detection Techniquesmentioning
confidence: 99%
“…The algorithm which is able to identify black hole attacks using probabilistic routing strategy was presented in [20]. In this approach, since nodes can join the transition range at different time intervals, the joining time of each node was considered.…”
Section: G Hint Based Probabilistic Approachmentioning
confidence: 99%