2019
DOI: 10.2139/ssrn.3351016
|View full text |Cite
|
Sign up to set email alerts
|

Survey: Black Hole Attack Detection in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…First, the packet generation rate means a value measured the amount of control packets that node k generates to its neighbor node n for a certain period time. And, the average value of the control packet of the cluster to which node n belongs is measured by equation (5).…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…First, the packet generation rate means a value measured the amount of control packets that node k generates to its neighbor node n for a certain period time. And, the average value of the control packet of the cluster to which node n belongs is measured by equation (5).…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…Here, ๐‘ƒ ๐‘“ (๐‘ ๐‘˜ ) is the amount of packets that the node n forwards to the destination node n, ๐‘ƒ ๐‘Ÿ (๐‘ ๐‘‘ ) is the amount of packets that the destination node d is among packets received by the node n. And the average value of packet forwarding within the cluster is calculated in the same way as in equation (5). The third packet discard rate is the value measuring packets forwarded to other neighbor nodes among all packets received neighbor node n. If the value is high, the node can be suspected of being a selfish node.…”
Section: ๐ถ ๐‘˜ (๐ด๐‘ฃ๐‘”(๐‘ƒmentioning
confidence: 99%
See 1 more Smart Citation
“…MANET is more vulnerable than the wired network due to mobility of nodes and the way used to exchange of data packets and control packets, generally, they passed from the source to the destination via different intermediate nodes [11] that can be malicious nodes inside the network. OLSR routing protocol can be affected by many active routing attacks which reduce its performances, in following we present three main routing attacks have negative impacts on OLSR protocol:…”
Section: Manet Routing Attacksmentioning
confidence: 99%
“…Security is a paramount concern in MANETS due to having a dynamic topology and nodes that can easily enter or exit the network at any time and have access to data flow throughout the net-work. In addition, several mobile nodes are limited to resources in terms of computational power and energy source [2,3]. As such, the presence of permanent security monitoring nodes in the network is almost impossible due to limited resources, and there is a need for remote control of nodes' behavior in the network and determining security necessities in MANET [4,5].…”
Section: Introductionmentioning
confidence: 99%