Routing security in wireless ad hoc networks
IEEE Communications Magazine
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks
Information Networking. Towards Ubiquitous Networking and Services
Measuring the impact of attacks on the performance of mobile ad hoc networks
Proceedings of the 6th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
DoS attacks exploiting signaling in UMTS and IMS
Computer Communications
Eliminating misbehaving nodes by opinion based trust evaluation model in MANETs
Proceedings of the 2011 International Conference on Communication, Computing & Security
Misbehaving nodes detection through opinion based trust evaluation model in MANETs
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Bullet-proof verification (BPV) method to detect black hole attack in mobile ad hoc networks
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Modelling and analysis of attacks on the MANET routing in AODV
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Secure routing in MANETs using local times
Wireless Networks
Enhancing performance of AODV against Black hole Attack
Proceedings of the CUBE International Information Technology Conference
Evaluation of classification algorithms for intrusion detection in MANETs
Knowledge-Based Systems
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Secure Video Transmission Against Black Hole Attack in MANETs
International Journal of Business Data Communications and Networking
Secure scheme against data dropping
Proceedings of the 16th Communications & Networking Symposium
Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents
The Journal of Supercomputing
Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks
International Journal of Technology Diffusion
Performance analysis of machine learning algorithms for intrusion detection in MANETs
International Journal of Wireless and Mobile Computing
Hi-index | 0.01 |
The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header. Computer simulation shows that compared to the original ad hoc on-demand distance vector (AODV) routing scheme, the second solution can verify 75% to 98% of the route to the destination depending on the pause times at a minimum cost of the delay in the networks.