Sensor: the atomic computing particle
ACM SIGMOD Record
Black hole attack in mobile Ad Hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Sinkhole Intrusion Indicators in DSR MANETs
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Inner-Circle Consistency for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Architectural framework for wireless mobile ad hoc networks (AF WMANETs)
Computer Communications
Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Service-based P2P overlay network for collaborative problem solving
Decision Support Systems
A new security scheme for on-demand source routing in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Cooperative black and gray hole attacks in mobile ad hoc networks
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
Anonymous Routing for Mobile Wireless Ad Hoc Networks
International Journal of Distributed Sensor Networks - Heterogenous Wireless Ad Hoc and Sensor Networks
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
Monitoring assisted robust routing in wireless mesh networks
Mobile Networks and Applications
Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks
Information Networking. Towards Ubiquitous Networking and Services
Multimodal security enforcement framework for wireless ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Association between nodes to combat blackhole attack in DSR based MANET
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
The simulation and comparison of routing attacks on DSR protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
Journal of Network and Systems Management
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Computers & Mathematics with Applications
Robustness of DTN against routing attacks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Energy aware topology security scheme for mobile ad hoc network
Proceedings of the 2011 International Conference on Communication, Computing & Security
Linear wireless sensor networks: Classification and applications
Journal of Network and Computer Applications
Bullet-proof verification (BPV) method to detect black hole attack in mobile ad hoc networks
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Trust-based minimum cost opportunistic routing for Ad hoc networks
Journal of Systems and Software
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
A wireless intrusion detection system for secure clustering and routing in ad hoc networks
ISC'06 Proceedings of the 9th international conference on Information Security
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
Secure route selection in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Anonymous routing in wireless mobile ad hoc networks to prevent location disclosure attacks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Self-organized security architecture for MANET
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
Improving the efficiency of anonymous routing for MANETs
Computer Communications
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
Journal of Network and Computer Applications
Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
A review of routing protocols for mobile ad hoc networks
WSEAS TRANSACTIONS on COMMUNICATIONS
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Secure routing in MANETs using local times
Wireless Networks
A secure on-demand source routing scheme using hierarchical clustering in mobile ad hoc networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
An efficient detection model of selective forwarding attacks in wireless mesh networks
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
Secure Video Transmission Against Black Hole Attack in MANETs
International Journal of Business Data Communications and Networking
Mitigating collaborative blackhole attacks on DSR-Based mobile ad hoc networks
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks
Wireless Personal Communications: An International Journal
Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents
The Journal of Supercomputing
Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks
International Journal of Technology Diffusion
On effective sampling techniques in host-based intrusion detection in tactical MANET
International Journal of Security and Networks
On effective data aggregation techniques in host-based intrusion detection in MANET
International Journal of Security and Networks
Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
Wireless Personal Communications: An International Journal
Modified DSR protocol for detection and removal of selective black hole attack in MANET
Computers and Electrical Engineering
Hi-index | 0.25 |
A mobile ad hoc network consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. MANET is an emerging research area with practical applications. However, wireless MANET is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. Routing plays an important role in the security of the entire network. In general, routing security in wireless MANETs appears to be a problem that is not trivial to solve. In this article we study the routing security issues of MANETs, and analyze in detail one type of attack-the "black hole" problem-that can easily be employed against the MANETs. We also propose a solution for the black hole problem for ad hoc on-demand distance vector routing protocol.