2008
DOI: 10.4304/jnw.3.5.13-20
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of Co-operative Black Hole Attack in MANET

Abstract:

A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc O… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
74
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 112 publications
(74 citation statements)
references
References 11 publications
0
74
0
Order By: Relevance
“…The attacker or malicious node usually exploits some routing protocols to distribute itself as having the direct and shorter route to source whose packets it wants to grab [1]. Once the attacker adds itself between the communicating nodes, it can do anything malicious with the packets passing between them.…”
Section: Black Hole Attackmentioning
confidence: 99%
“…The attacker or malicious node usually exploits some routing protocols to distribute itself as having the direct and shorter route to source whose packets it wants to grab [1]. Once the attacker adds itself between the communicating nodes, it can do anything malicious with the packets passing between them.…”
Section: Black Hole Attackmentioning
confidence: 99%
“…The first category is of those which modify specific well known routing protocols such as AODV, DSR and OLSR to avoid/detect blackhole attack during route reply [1] [2]. The second category is of those which adopt an extra monitoring system such as a watchdog, confidant protocol or intrusion detection system [3] [4].…”
Section: Related Workmentioning
confidence: 99%
“…al. [2] proposed an enhancement of the AODV protocol by introducing fidelity table. The RREPs are collected in the response table and the fidelity level of each RREP is checked and one is selected having the highest level.…”
Section: Related Workmentioning
confidence: 99%
“…But this approach is not strong enough to cooperative black hole attacks. In [7], authors proposed a solution to avoid multiple black hole attacks in group. In this, every participating node is uses a fidelity table to know the reliability of any node.…”
Section: Network Layer Defense and Related Workmentioning
confidence: 99%