Skip to main content
Erschienen in: Wireless Networks 3/2020

27.02.2019

A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability

verfasst von: Shashi Gurung, Siddhartha Chauhan

Erschienen in: Wireless Networks | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless network in which the mobile nodes operate in a distributed manner and collaborate with each other in order to provide the multi-hop communication between the source and the destination node. Generally, the main assumption considered in the MANET is that each node is a trusted node. However, in a real scenario, there are some unreliable nodes which misbehave and launch the attack in network like black-hole in which the misbehaving nodes attract all the traffic towards itself by giving false information of having a shortest path towards the destination with a very high destination sequence number. In this paper, we discussed different possible nature of the nodes in the network that can lead to the different possible attacks. We have also presented the different classification of the techniques and discussed the merits, drawbacks, and suitability of the various techniques in different scenarios which need to be taken into consideration while designing an efficient protocol.

Graphical Abstract

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle River: Prentice Hall PTR. Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle River: Prentice Hall PTR.
2.
Zurück zum Zitat Perkins, C. E., Beliding-Royer, E., & Das, S. (2004). Ad hoc on-demand distance vector (AODV) routing. Roma: IETF Internet Draft, MANET working group. Perkins, C. E., Beliding-Royer, E., & Das, S. (2004). Ad hoc on-demand distance vector (AODV) routing. Roma: IETF Internet Draft, MANET working group.
3.
Zurück zum Zitat Johnson, D. B., Maltz, D. A., & Hu, Y.-C. (2004). The dynamic source routing protocol for mobile ad-hoc network (DSR). Roma: IETF Internet Draft. Johnson, D. B., Maltz, D. A., & Hu, Y.-C. (2004). The dynamic source routing protocol for mobile ad-hoc network (DSR). Roma: IETF Internet Draft.
4.
Zurück zum Zitat Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad-hoc networks: A survey. In IEEE 2nd international conference on advanced computing & communication technologies. Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad-hoc networks: A survey. In IEEE 2nd international conference on advanced computing & communication technologies.
7.
Zurück zum Zitat Sangi, A. R., Liu, J., & Zou, L. (2009). A performance analysis of aodv routing protocol under combined byzantine attacks in manets. In Computational intelligence and software engineering. CiSE 2009. International conference on (pp. 1–5). Piscataway: IEEE. Sangi, A. R., Liu, J., & Zou, L. (2009). A performance analysis of aodv routing protocol under combined byzantine attacks in manets. In Computational intelligence and software engineering. CiSE 2009. International conference on (pp. 1–5). Piscataway: IEEE.
8.
Zurück zum Zitat Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE international conference on WiSPNET (pp. 2409–2415). Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE international conference on WiSPNET (pp. 2409–2415).
9.
Zurück zum Zitat Li, C., Wang, Z., & Yang, C. (2010). SEAODV: A security enhanced AODV routing protocol for wireless mesh networks. Transactions on computational science XI (pp. 1–16). Berlin: Springer. Li, C., Wang, Z., & Yang, C. (2010). SEAODV: A security enhanced AODV routing protocol for wireless mesh networks. Transactions on computational science XI (pp. 1–16). Berlin: Springer.
10.
Zurück zum Zitat Dhanalakshmi, K. S., Kannapiran, B., & Divya, A. (2014). Enhancing manet security using hybrid techniques in key generation mechanism. In Electronics and communication systems (ICECS), international conference on (pp. 1–5). Piscataway: IEEE. Dhanalakshmi, K. S., Kannapiran, B., & Divya, A. (2014). Enhancing manet security using hybrid techniques in key generation mechanism. In Electronics and communication systems (ICECS), international conference on (pp. 1–5). Piscataway: IEEE.
11.
Zurück zum Zitat Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). New York City: ACM. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). New York City: ACM.
12.
Zurück zum Zitat Medadian, M., Yektaie, M. H., & Rahmani, A. M. (2009, November). Combat with black hole attack in AODV routing protocol in MANET. In Internet, 2009. AH-ICI 2009. First Asian himalayas international conference on (pp. 1–5). Piscataway: IEEE. Medadian, M., Yektaie, M. H., & Rahmani, A. M. (2009, November). Combat with black hole attack in AODV routing protocol in MANET. In Internet, 2009. AH-ICI 2009. First Asian himalayas international conference on (pp. 1–5). Piscataway: IEEE.
13.
Zurück zum Zitat Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security,5(3), 338–346. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security,5(3), 338–346.
14.
Zurück zum Zitat Raj, P. N., & Swadas, P. B. (2009). DPRAODV: A dyanamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science,2(3), 54–59. Raj, P. N., & Swadas, P. B. (2009). DPRAODV: A dyanamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science,2(3), 54–59.
15.
Zurück zum Zitat Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP,11(1), 1–121. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP,11(1), 1–121.
16.
Zurück zum Zitat Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in aodv based manets. In International conference on advances in communication, network, and computing (pp. 60–67). Berlin: Springer. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in aodv based manets. In International conference on advances in communication, network, and computing (pp. 60–67). Berlin: Springer.
17.
Zurück zum Zitat Tan, S., & Kim, K. (2013). Secure route discovery for preventing black hole attacks on AODV-based MANETs. In ICT convergence (ICTC), 2013 international conference on (pp. 1027–1032). Piscataway: IEEE. Tan, S., & Kim, K. (2013). Secure route discovery for preventing black hole attacks on AODV-based MANETs. In ICT convergence (ICTC), 2013 international conference on (pp. 1027–1032). Piscataway: IEEE.
18.
Zurück zum Zitat Salunke, A., & Ambawade, D. (2015). Dynamic sequence number thresholding protocol for detection of blackhole attack in wireless sensor network. In Communication, information & computing technology (ICCICT), 2015 international conference on (pp. 1–4). Piscataway: IEEE. Salunke, A., & Ambawade, D. (2015). Dynamic sequence number thresholding protocol for detection of blackhole attack in wireless sensor network. In Communication, information & computing technology (ICCICT), 2015 international conference on (pp. 1–4). Piscataway: IEEE.
21.
Zurück zum Zitat Balakrishnan, K., Deng, J., & Varshney, V. K. (2005, March). TWOACK: Preventing selfishness in mobile ad hoc networks. In Wireless communications and networking conference, 2005 IEEE (Vol. 4, pp. 2137–2142). Piscataway: IEEE. Balakrishnan, K., Deng, J., & Varshney, V. K. (2005, March). TWOACK: Preventing selfishness in mobile ad hoc networks. In Wireless communications and networking conference, 2005 IEEE (Vol. 4, pp. 2137–2142). Piscataway: IEEE.
22.
Zurück zum Zitat Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.CrossRef Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.CrossRef
23.
Zurück zum Zitat Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Mouftah, H. (2010, April). AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In Advanced information networking and applications (AINA), 2010 24th IEEE international conference on (pp. 634–640). Piscataway: IEEE. Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Mouftah, H. (2010, April). AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In Advanced information networking and applications (AINA), 2010 24th IEEE international conference on (pp. 634–640). Piscataway: IEEE.
24.
Zurück zum Zitat Dhiman, D., & Sood, N. (2014, December). Enhanced 2ACK scheme for reducing routing overhead in MANETs. In Parallel, distributed and grid computing (PDGC), 2014 international conference on (pp. 120–125). Piscataway: IEEE. Dhiman, D., & Sood, N. (2014, December). Enhanced 2ACK scheme for reducing routing overhead in MANETs. In Parallel, distributed and grid computing (PDGC), 2014 international conference on (pp. 120–125). Piscataway: IEEE.
25.
Zurück zum Zitat Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications,35(3), 1130–1139.CrossRef Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications,35(3), 1130–1139.CrossRef
26.
Zurück zum Zitat Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine,40(10), 70–75.CrossRef Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine,40(10), 70–75.CrossRef
27.
Zurück zum Zitat Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., & Nygard, K. E. (2003, June). Prevention of cooperative black hole attack in wireless ad hoc networks. In International conference on wireless networks (Vol. 2003, pp. 570–575). Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., & Nygard, K. E. (2003, June). Prevention of cooperative black hole attack in wireless ad hoc networks. In International conference on wireless networks (Vol. 2003, pp. 570–575).
28.
Zurück zum Zitat Yu, C. W., Wu, T. K., Cheng, R. H., & Chang, S. C. (2007, May). A distributed and cooperative black hole node detection and elimination mechanism for ad hoc networks. In Pacific-Asia conference on knowledge discovery and data mining (pp. 538–549). Berlin: Springer. Yu, C. W., Wu, T. K., Cheng, R. H., & Chang, S. C. (2007, May). A distributed and cooperative black hole node detection and elimination mechanism for ad hoc networks. In Pacific-Asia conference on knowledge discovery and data mining (pp. 538–549). Berlin: Springer.
29.
Zurück zum Zitat Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking (Vol. 2, pp. 362-367). IEEE. Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking (Vol. 2, pp. 362-367). IEEE.
30.
Zurück zum Zitat Dorri, A., & Nikdel, H. (2015, May). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In Information and knowledge technology (IKT), 2015 7th conference on (pp. 1–6). Piscataway: IEEE. Dorri, A., & Nikdel, H. (2015, May). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In Information and knowledge technology (IKT), 2015 7th conference on (pp. 1–6). Piscataway: IEEE.
31.
Zurück zum Zitat Peng, G., & Chuanyun, Z. (2006). Routing attacks and solutions in mobile ad hoc networks. In Communication technology, 2006. ICCT’06. International conference on (pp. 1–4). Piscataway: IEEE. Peng, G., & Chuanyun, Z. (2006). Routing attacks and solutions in mobile ad hoc networks. In Communication technology, 2006. ICCT’06. International conference on (pp. 1–4). Piscataway: IEEE.
32.
Zurück zum Zitat Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security,6(2), 77–83.CrossRef Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security,6(2), 77–83.CrossRef
33.
Zurück zum Zitat Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec–using reputation-based multilayer security to protect MANETs. Computers & Security,31(1), 122–136.CrossRef Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec–using reputation-based multilayer security to protect MANETs. Computers & Security,31(1), 122–136.CrossRef
34.
Zurück zum Zitat Kumari, S. V., & Paramasivan, B. (2015, April). Ant based defense mechanism for selective forwarding attack in MANET. In Data engineering workshops (ICDEW), 2015 31st IEEE international conference on (pp. 92–97). Piscataway: IEEE. Kumari, S. V., & Paramasivan, B. (2015, April). Ant based defense mechanism for selective forwarding attack in MANET. In Data engineering workshops (ICDEW), 2015 31st IEEE international conference on (pp. 92–97). Piscataway: IEEE.
35.
Zurück zum Zitat Fahad, T., Djenouri, D., & Askwith, R. (2007, August). On detecting packets droppers in manet: A novel low cost approach. In Information assurance and security, 2007. IAS 2007. Third international symposium on (pp. 56–64). Piscataway: IEEE. Fahad, T., Djenouri, D., & Askwith, R. (2007, August). On detecting packets droppers in manet: A novel low cost approach. In Information assurance and security, 2007. IAS 2007. Third international symposium on (pp. 56–64). Piscataway: IEEE.
36.
Zurück zum Zitat Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K., & Banerjee, P. K. (2012, August). Two-level secure re-routing (TSR) in mobile ad hoc networks. In Advances in mobile network, communication and its applications (MNCAPPS), 2012 international conference on (pp. 119–122). Piscataway: IEEE. Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K., & Banerjee, P. K. (2012, August). Two-level secure re-routing (TSR) in mobile ad hoc networks. In Advances in mobile network, communication and its applications (MNCAPPS), 2012 international conference on (pp. 119–122). Piscataway: IEEE.
37.
Zurück zum Zitat Shi, F., Liu, W., Jin, D., & Song, J. (2014). A cluster-based countermeasure against blackhole attacks in MANETs. Telecommunication Systems,57(2), 119–136.CrossRef Shi, F., Liu, W., Jin, D., & Song, J. (2014). A cluster-based countermeasure against blackhole attacks in MANETs. Telecommunication Systems,57(2), 119–136.CrossRef
38.
Zurück zum Zitat Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013, April). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Information & communication technologies (ICT), 2013 IEEE conference on (pp. 479–484). Piscataway: IEEE. Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013, April). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Information & communication technologies (ICT), 2013 IEEE conference on (pp. 479–484). Piscataway: IEEE.
39.
Zurück zum Zitat Singh, M., & Singh, P. (2016, August). Black hole attack detection in MANET using mobile trust points with clustering. In International conference on smart trends for information technology and computer communications (pp. 565–572). Singapore: Springer. Singh, M., & Singh, P. (2016, August). Black hole attack detection in MANET using mobile trust points with clustering. In International conference on smart trends for information technology and computer communications (pp. 565–572). Singapore: Springer.
40.
Zurück zum Zitat Su, M. Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications,34(1), 107–117.CrossRef Su, M. Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications,34(1), 107–117.CrossRef
41.
Zurück zum Zitat Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering,40(2), 530–538.CrossRef Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering,40(2), 530–538.CrossRef
42.
Zurück zum Zitat Barani, F. (2014). A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system. In Intelligent systems (ICIS), 2014 Iranian conference on (pp. 1–6). Piscataway: IEEE. Barani, F. (2014). A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system. In Intelligent systems (ICIS), 2014 Iranian conference on (pp. 1–6). Piscataway: IEEE.
43.
Zurück zum Zitat Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray-hole attack in MANET. Wireless Networks,24(2), 565–579.CrossRef Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray-hole attack in MANET. Wireless Networks,24(2), 565–579.CrossRef
44.
Zurück zum Zitat Lee, S., Han, B., & Shin, M. (2002). Robust routing in wireless ad hoc networks. In Parallel processing workshops, 2002. Proceedings international conference on (pp. 73–78). Piscataway: IEEE. Lee, S., Han, B., & Shin, M. (2002). Robust routing in wireless ad hoc networks. In Parallel processing workshops, 2002. Proceedings international conference on (pp. 73–78). Piscataway: IEEE.
45.
Zurück zum Zitat Tamilselvan, L., & Sankaranarayanan, V. (2007). Prevention of blackhole attack in MANET. In Wireless broadband and ultra wideband communications, 2007. AusWireless 2007. The 2nd international conference on (pp. 21–21). Piscataway: IEEE. Tamilselvan, L., & Sankaranarayanan, V. (2007). Prevention of blackhole attack in MANET. In Wireless broadband and ultra wideband communications, 2007. AusWireless 2007. The 2nd international conference on (pp. 21–21). Piscataway: IEEE.
46.
Zurück zum Zitat Dokurer, S., Erten, Y. M., & Acar, C. E. (2007). Performance analysis of ad-hoc networks under black hole attacks. In SoutheastCon, proceedings on (pp. 148–153). Piscataway: IEEE. Dokurer, S., Erten, Y. M., & Acar, C. E. (2007). Performance analysis of ad-hoc networks under black hole attacks. In SoutheastCon, proceedings on (pp. 148–153). Piscataway: IEEE.
47.
Zurück zum Zitat Lu, S., Li, L., Lam, K. Y., & Jia, L. (2009). SAODV: A MANET routing protocol that can withstand black hole attack. In Computational intelligence and security, 2009. CIS’09. International conference on (Vol. 2, pp. 421–425). Piscataway: IEEE. Lu, S., Li, L., Lam, K. Y., & Jia, L. (2009). SAODV: A MANET routing protocol that can withstand black hole attack. In Computational intelligence and security, 2009. CIS’09. International conference on (Vol. 2, pp. 421–425). Piscataway: IEEE.
48.
Zurück zum Zitat Mistry, N., Jinwala, D. C., & Zaveri, M. (2010). Improving AODV protocol against blackhole attacks. In Proceedings of the international multi conference of engineers and computer scientists (Vol. 2). Mistry, N., Jinwala, D. C., & Zaveri, M. (2010). Improving AODV protocol against blackhole attacks. In Proceedings of the international multi conference of engineers and computer scientists (Vol. 2).
49.
Zurück zum Zitat Ameza, F., Assam, N., & Beghdad, R. (2010). Defending AODV routing protocol against the black hole attack. International Journal of Computer Science and Information Security,8(2), 112–117. Ameza, F., Assam, N., & Beghdad, R. (2010). Defending AODV routing protocol against the black hole attack. International Journal of Computer Science and Information Security,8(2), 112–117.
50.
Zurück zum Zitat Yerneni, R., & Sarje, A. K. (2012). Enhancing performance of AODV against black hole attack. In Proceedings of the CUBE international information technology conference (pp. 857–862). New York City: ACM. Yerneni, R., & Sarje, A. K. (2012). Enhancing performance of AODV against black hole attack. In Proceedings of the CUBE international information technology conference (pp. 857–862). New York City: ACM.
51.
Zurück zum Zitat Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal,9(1), 65–75.CrossRef Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal,9(1), 65–75.CrossRef
52.
Zurück zum Zitat Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks,21(8), 2781–2798.CrossRef Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks,21(8), 2781–2798.CrossRef
53.
Zurück zum Zitat Gurung, S., & Saluja, K. K. (2014). Mitigating impact of blackhole attack in MANET. In International conference on recent trends in information, telecommunication and computing, ITC (pp. 229-237). Gurung, S., & Saluja, K. K. (2014). Mitigating impact of blackhole attack in MANET. In International conference on recent trends in information, telecommunication and computing, ITC (pp. 229-237).
54.
Zurück zum Zitat Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks,113, 94–110.CrossRef Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks,113, 94–110.CrossRef
Metadaten
Titel
A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability
verfasst von
Shashi Gurung
Siddhartha Chauhan
Publikationsdatum
27.02.2019
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 3/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-01966-z

Weitere Artikel der Ausgabe 3/2020

Wireless Networks 3/2020 Zur Ausgabe

Neuer Inhalt