2018
DOI: 10.14419/ijet.v7i2.6.10139
|View full text |Cite
|
Sign up to set email alerts
|

Energy aware detection and prevention of black hole attack in MANET

Abstract: Energy and security are the two vital components of Mobile Ad-hoc Networks (MANETs). During routing finding an optimal path from sender to receiver sense of path length (number of hops), longevity (battery life) and security becomes an essential requirement. Variety of schemes are proposed by the researchers for finding the shortest path along with energy saving and protecting from attacks Black-hole and gray-hole attacks are some of the most harmful attacks against MANET communication and needs attention. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…This characteristic of the network let to implement a trust model for co-relating with the innate trust being shared between the nodes. Energy-aware detection algorithms detect the black hole attack with enhanced security [3]. There is already enough research regarding black hole attack using AODV protocol [4,5].…”
Section: Literature Surveymentioning
confidence: 99%
“…This characteristic of the network let to implement a trust model for co-relating with the innate trust being shared between the nodes. Energy-aware detection algorithms detect the black hole attack with enhanced security [3]. There is already enough research regarding black hole attack using AODV protocol [4,5].…”
Section: Literature Surveymentioning
confidence: 99%
“…The above-mentioned existing works have focused on only for the detection of Blackhole attack node. Panda et al [10] have worked for the detection as well as to minimize the side effect of the gray hole and Blackhole attack in MANET by implementing a new technique named as Ant Colony Optimization (ACO). The purpose of this technique is to determine the shortest route from transmitting node to the target node based on the energy consumption rate.…”
Section: Related Workmentioning
confidence: 99%
“…Selectively this attack can drop routing packets for a specific node or a portion of packets. In details a black-hole [11] is a malicious node as depicted in Figure. 7, which replies the Route Request (RREQ) in fake without having any route towords the desination and drops all the packets.…”
Section: Blackhole Attackmentioning
confidence: 99%
“…Grey-hole [11] attack is special case of black-hole attack in which an attacker becomes the part of an active route within the network as in black-hole attack but does not drop the data packets routed through it entirely. Initially attacker node may behave as legitimate node to trust but later on drop packets selectively with certain probability from some specific nodes or in some other specific pattern.…”
Section: Gray-hole Attackmentioning
confidence: 99%
See 1 more Smart Citation