2010
DOI: 10.5120/267-426
|View full text |Cite
|
Sign up to set email alerts
|

Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining

Abstract: Security in wireless ad-hoc networks is a complex issue. The wireless and dynamic nature of ad-hoc networks makes them more vulnerable to security attacks when compared with fixed networks. The existing routing protocols are optimized to perform the routing process without considering the security problem.. Black hole attack is one of the routing attacks in which, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…Black holes refer to places in the network where incoming traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipients. The method how malicious node fits in the data routes varies [22].…”
Section: Black Hole Attackmentioning
confidence: 99%
“…Black holes refer to places in the network where incoming traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipients. The method how malicious node fits in the data routes varies [22].…”
Section: Black Hole Attackmentioning
confidence: 99%
“…Any node having 0 values is considered as malicious node and is eliminated. E.A Mary Anita et al [3] proposed a solution implemented on the top of ODMRP protocol. The authors proposed a certificate based authentication mechanism to counter the effect of black hole attack.…”
Section: Literature Surveymentioning
confidence: 99%
“…It is also implemented on unicast routing protocol such as DSR. E.A Mary Anita et al [3] proposed a solution implemented on the top of ODMRP protocol. The authors proposed a certificate based authentication mechanism to counter the effect of black hole attack.…”
Section: Related Workmentioning
confidence: 99%