2015 7th Conference on Information and Knowledge Technology (IKT) 2015
DOI: 10.1109/ikt.2015.7288749
|View full text |Cite
|
Sign up to set email alerts
|

Detection of black hole attack in wireless sensor network using UAV

Abstract: The research demonstrates simulation of black hole attack in wireless sensor networks in NS2. A node is suspected to be malicious in case there is a large drop of packets by the node and as a result very few or none of the packets are allowed to reach the destination. In the first case a modified AODV protocol is presented for wireless network. The modification allows the creation of black hole node in the network and advanced dynamic routing in the simulating environment. Thereafter detecting the same by maki… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Motamedi and Nasser [65] developed a method using Unmanned Aerial Vehicles (UAV) to take the place of mobile agents and applied a dynamic threshold to determine whether the detected node is a black hole node. This method was applied in a stationary network.…”
Section: Black Hole Attack (Bha)mentioning
confidence: 99%
“…Motamedi and Nasser [65] developed a method using Unmanned Aerial Vehicles (UAV) to take the place of mobile agents and applied a dynamic threshold to determine whether the detected node is a black hole node. This method was applied in a stationary network.…”
Section: Black Hole Attack (Bha)mentioning
confidence: 99%
“…On the other hand, in the Black hole attack, malicious nodes send a route reply message to the sender in return receive packets from sender node and discard packets instead of forwarding to the destination node. In their research, Motamedi et al [107] show the detection procedure of Black hole attack in WSN using unmanned aerial vehicles (UAVs). Furthermore, Bansal et al [104] discussed the anomaly-based detection on leach protocol in WSN and Kaur and Singh [105] presented a way to identify and mitigate the Black hole attack in WSN.…”
Section: G Routing Attackmentioning
confidence: 99%
“…The drawback of this it cannot secure the WMN from intruder purely. Motamedi M [15] introduce the method to detect the black hole attack on the wireless network that cause misfortune of essential information. In this method uses the UAV and SPRT for the better result to detecting the black hole attack.…”
Section: Related Workmentioning
confidence: 99%