2020
DOI: 10.1007/978-3-030-40305-8_20
|View full text |Cite
|
Sign up to set email alerts
|

Black Hole Attack and Its Security Measure in Wireless Sensors Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…The most common attacks are listed below. − Black hole attack: It consumes all the packets sent by the sensor nodes and removes them in pretext of having best routes [24]. − Sinkhole attack: It is similar to black hole attack.…”
Section: Different Types Of Attacks In Wireless Sensor Network (Wsn)mentioning
confidence: 99%
“…The most common attacks are listed below. − Black hole attack: It consumes all the packets sent by the sensor nodes and removes them in pretext of having best routes [24]. − Sinkhole attack: It is similar to black hole attack.…”
Section: Different Types Of Attacks In Wireless Sensor Network (Wsn)mentioning
confidence: 99%
“…Blackmail attack: In the blackmail attack, a compromised node eliminates a legitimate node from the network by proclaiming that the legitimate node is a malicious node. If a compromised node is able to block a large number of nodes, the network will become unstable [ 142 , 143 ].…”
Section: Devices’ Vulnerabilities and Requirementsmentioning
confidence: 99%
“…In the research [30,31] has attempted to demonstrate how spoofing, brute force attacks, buffer overflow and cross-side scripting are all linked to Indian public and private sector banks. Cyber-attacks such as online identity theft [31], hacking [32] and harmful code [31,32]; DOS attack and credit card/ATM frauds [33] are also linked to Intruder Detection, as is System Monitoring.…”
Section: Related Workmentioning
confidence: 99%