2019
DOI: 10.1016/j.procs.2019.01.028
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Black Hole Attack in Wireless Sensor Network Using HMM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 19 publications
0
22
0
Order By: Relevance
“…Then it takes in each and every data packet directed to that target node. It is hard to detect black hole nodes that use a better sequence number especially if the network's sequence number is close to the one utilized by the attacker [3,15,24].…”
Section: ) Black Holementioning
confidence: 99%
See 1 more Smart Citation
“…Then it takes in each and every data packet directed to that target node. It is hard to detect black hole nodes that use a better sequence number especially if the network's sequence number is close to the one utilized by the attacker [3,15,24].…”
Section: ) Black Holementioning
confidence: 99%
“…Kalkha et al in [15] presented a protocol that makes use of black hole prevention technique to identify adversarial nodes using Hidden Marcov Model. Their method works in two modules namely, detection and decision-making.…”
Section: Related Workmentioning
confidence: 99%
“…The method should be such that it can fight for the path link break under difficult conditions between the starting and the ending pint in the path during the communication [ 3 ].…”
Section: Introductionmentioning
confidence: 99%
“…The dataset used in this paper contains four types of DoS [18] attack: Grayhole, Blackhole, Flooding and TDMA [19][20]. By applying suitable data mining techniques, it is possible to actively detect intrusion in network because it helps to discover patterns in large datasets [21].…”
Section: Introductionmentioning
confidence: 99%