2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW) 2020
DOI: 10.1109/candarw51189.2020.00024
|View full text |Cite
|
Sign up to set email alerts
|

Blackhole Attack Cooperative Prevention Method in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…In this section, we compare between the proposed IDS and the thresholdbased method under multiple smart black holes attacks. Remember that a The least-square method is used to determine the sequence number threshold, this is by exploiting the information collected from neighbours [40]. The main idea is that the sequence number increases proportionally over time.…”
Section: Proposed Ids Versus Threshold Based Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, we compare between the proposed IDS and the thresholdbased method under multiple smart black holes attacks. Remember that a The least-square method is used to determine the sequence number threshold, this is by exploiting the information collected from neighbours [40]. The main idea is that the sequence number increases proportionally over time.…”
Section: Proposed Ids Versus Threshold Based Methodsmentioning
confidence: 99%
“…The black hole attack is classified among the most dangerous threats in MANET networks, indeed in this attack, a malicious node redirect all communications to it self in order to drop or to modify them, witch hijack the purpose that the network is deployed for. Hence, the necessity to implement Many researchers are interested by this field of research and several solutions were proposed in the literature to detect and isolate the black holes, for example by examining the sequence number of the replays [16,27,32,38] or by modifying the structure of the AODV control messages [25,39] or by sending a RREQ without destination address [40], since the malicious node responds to all REEQ without checking if the destination address is mentioned in the RREQ or not ... etc. Unfortunately, most of the proposed IDS are, now, inefficient against the new generation of black holes, known also by smart black holes [40].…”
Section: Smart Black Hole Attackmentioning
confidence: 99%
See 3 more Smart Citations