Skip to main content
Top
Published in: Wireless Networks 3/2020

27-02-2019

A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability

Published in: Wireless Networks | Issue 3/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless network in which the mobile nodes operate in a distributed manner and collaborate with each other in order to provide the multi-hop communication between the source and the destination node. Generally, the main assumption considered in the MANET is that each node is a trusted node. However, in a real scenario, there are some unreliable nodes which misbehave and launch the attack in network like black-hole in which the misbehaving nodes attract all the traffic towards itself by giving false information of having a shortest path towards the destination with a very high destination sequence number. In this paper, we discussed different possible nature of the nodes in the network that can lead to the different possible attacks. We have also presented the different classification of the techniques and discussed the merits, drawbacks, and suitability of the various techniques in different scenarios which need to be taken into consideration while designing an efficient protocol.

Graphical Abstract

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle River: Prentice Hall PTR. Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle River: Prentice Hall PTR.
2.
go back to reference Perkins, C. E., Beliding-Royer, E., & Das, S. (2004). Ad hoc on-demand distance vector (AODV) routing. Roma: IETF Internet Draft, MANET working group. Perkins, C. E., Beliding-Royer, E., & Das, S. (2004). Ad hoc on-demand distance vector (AODV) routing. Roma: IETF Internet Draft, MANET working group.
3.
go back to reference Johnson, D. B., Maltz, D. A., & Hu, Y.-C. (2004). The dynamic source routing protocol for mobile ad-hoc network (DSR). Roma: IETF Internet Draft. Johnson, D. B., Maltz, D. A., & Hu, Y.-C. (2004). The dynamic source routing protocol for mobile ad-hoc network (DSR). Roma: IETF Internet Draft.
4.
go back to reference Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad-hoc networks: A survey. In IEEE 2nd international conference on advanced computing & communication technologies. Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad-hoc networks: A survey. In IEEE 2nd international conference on advanced computing & communication technologies.
7.
go back to reference Sangi, A. R., Liu, J., & Zou, L. (2009). A performance analysis of aodv routing protocol under combined byzantine attacks in manets. In Computational intelligence and software engineering. CiSE 2009. International conference on (pp. 1–5). Piscataway: IEEE. Sangi, A. R., Liu, J., & Zou, L. (2009). A performance analysis of aodv routing protocol under combined byzantine attacks in manets. In Computational intelligence and software engineering. CiSE 2009. International conference on (pp. 1–5). Piscataway: IEEE.
8.
go back to reference Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE international conference on WiSPNET (pp. 2409–2415). Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE international conference on WiSPNET (pp. 2409–2415).
9.
go back to reference Li, C., Wang, Z., & Yang, C. (2010). SEAODV: A security enhanced AODV routing protocol for wireless mesh networks. Transactions on computational science XI (pp. 1–16). Berlin: Springer. Li, C., Wang, Z., & Yang, C. (2010). SEAODV: A security enhanced AODV routing protocol for wireless mesh networks. Transactions on computational science XI (pp. 1–16). Berlin: Springer.
10.
go back to reference Dhanalakshmi, K. S., Kannapiran, B., & Divya, A. (2014). Enhancing manet security using hybrid techniques in key generation mechanism. In Electronics and communication systems (ICECS), international conference on (pp. 1–5). Piscataway: IEEE. Dhanalakshmi, K. S., Kannapiran, B., & Divya, A. (2014). Enhancing manet security using hybrid techniques in key generation mechanism. In Electronics and communication systems (ICECS), international conference on (pp. 1–5). Piscataway: IEEE.
11.
go back to reference Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). New York City: ACM. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). New York City: ACM.
12.
go back to reference Medadian, M., Yektaie, M. H., & Rahmani, A. M. (2009, November). Combat with black hole attack in AODV routing protocol in MANET. In Internet, 2009. AH-ICI 2009. First Asian himalayas international conference on (pp. 1–5). Piscataway: IEEE. Medadian, M., Yektaie, M. H., & Rahmani, A. M. (2009, November). Combat with black hole attack in AODV routing protocol in MANET. In Internet, 2009. AH-ICI 2009. First Asian himalayas international conference on (pp. 1–5). Piscataway: IEEE.
13.
go back to reference Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security,5(3), 338–346. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security,5(3), 338–346.
14.
go back to reference Raj, P. N., & Swadas, P. B. (2009). DPRAODV: A dyanamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science,2(3), 54–59. Raj, P. N., & Swadas, P. B. (2009). DPRAODV: A dyanamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science,2(3), 54–59.
15.
go back to reference Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP,11(1), 1–121. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP,11(1), 1–121.
16.
go back to reference Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in aodv based manets. In International conference on advances in communication, network, and computing (pp. 60–67). Berlin: Springer. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in aodv based manets. In International conference on advances in communication, network, and computing (pp. 60–67). Berlin: Springer.
17.
go back to reference Tan, S., & Kim, K. (2013). Secure route discovery for preventing black hole attacks on AODV-based MANETs. In ICT convergence (ICTC), 2013 international conference on (pp. 1027–1032). Piscataway: IEEE. Tan, S., & Kim, K. (2013). Secure route discovery for preventing black hole attacks on AODV-based MANETs. In ICT convergence (ICTC), 2013 international conference on (pp. 1027–1032). Piscataway: IEEE.
18.
go back to reference Salunke, A., & Ambawade, D. (2015). Dynamic sequence number thresholding protocol for detection of blackhole attack in wireless sensor network. In Communication, information & computing technology (ICCICT), 2015 international conference on (pp. 1–4). Piscataway: IEEE. Salunke, A., & Ambawade, D. (2015). Dynamic sequence number thresholding protocol for detection of blackhole attack in wireless sensor network. In Communication, information & computing technology (ICCICT), 2015 international conference on (pp. 1–4). Piscataway: IEEE.
21.
go back to reference Balakrishnan, K., Deng, J., & Varshney, V. K. (2005, March). TWOACK: Preventing selfishness in mobile ad hoc networks. In Wireless communications and networking conference, 2005 IEEE (Vol. 4, pp. 2137–2142). Piscataway: IEEE. Balakrishnan, K., Deng, J., & Varshney, V. K. (2005, March). TWOACK: Preventing selfishness in mobile ad hoc networks. In Wireless communications and networking conference, 2005 IEEE (Vol. 4, pp. 2137–2142). Piscataway: IEEE.
22.
go back to reference Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.CrossRef Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.CrossRef
23.
go back to reference Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Mouftah, H. (2010, April). AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In Advanced information networking and applications (AINA), 2010 24th IEEE international conference on (pp. 634–640). Piscataway: IEEE. Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Mouftah, H. (2010, April). AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In Advanced information networking and applications (AINA), 2010 24th IEEE international conference on (pp. 634–640). Piscataway: IEEE.
24.
go back to reference Dhiman, D., & Sood, N. (2014, December). Enhanced 2ACK scheme for reducing routing overhead in MANETs. In Parallel, distributed and grid computing (PDGC), 2014 international conference on (pp. 120–125). Piscataway: IEEE. Dhiman, D., & Sood, N. (2014, December). Enhanced 2ACK scheme for reducing routing overhead in MANETs. In Parallel, distributed and grid computing (PDGC), 2014 international conference on (pp. 120–125). Piscataway: IEEE.
25.
go back to reference Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications,35(3), 1130–1139.CrossRef Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications,35(3), 1130–1139.CrossRef
26.
go back to reference Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine,40(10), 70–75.CrossRef Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine,40(10), 70–75.CrossRef
27.
go back to reference Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., & Nygard, K. E. (2003, June). Prevention of cooperative black hole attack in wireless ad hoc networks. In International conference on wireless networks (Vol. 2003, pp. 570–575). Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., & Nygard, K. E. (2003, June). Prevention of cooperative black hole attack in wireless ad hoc networks. In International conference on wireless networks (Vol. 2003, pp. 570–575).
28.
go back to reference Yu, C. W., Wu, T. K., Cheng, R. H., & Chang, S. C. (2007, May). A distributed and cooperative black hole node detection and elimination mechanism for ad hoc networks. In Pacific-Asia conference on knowledge discovery and data mining (pp. 538–549). Berlin: Springer. Yu, C. W., Wu, T. K., Cheng, R. H., & Chang, S. C. (2007, May). A distributed and cooperative black hole node detection and elimination mechanism for ad hoc networks. In Pacific-Asia conference on knowledge discovery and data mining (pp. 538–549). Berlin: Springer.
29.
go back to reference Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking (Vol. 2, pp. 362-367). IEEE. Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking (Vol. 2, pp. 362-367). IEEE.
30.
go back to reference Dorri, A., & Nikdel, H. (2015, May). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In Information and knowledge technology (IKT), 2015 7th conference on (pp. 1–6). Piscataway: IEEE. Dorri, A., & Nikdel, H. (2015, May). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In Information and knowledge technology (IKT), 2015 7th conference on (pp. 1–6). Piscataway: IEEE.
31.
go back to reference Peng, G., & Chuanyun, Z. (2006). Routing attacks and solutions in mobile ad hoc networks. In Communication technology, 2006. ICCT’06. International conference on (pp. 1–4). Piscataway: IEEE. Peng, G., & Chuanyun, Z. (2006). Routing attacks and solutions in mobile ad hoc networks. In Communication technology, 2006. ICCT’06. International conference on (pp. 1–4). Piscataway: IEEE.
32.
go back to reference Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security,6(2), 77–83.CrossRef Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security,6(2), 77–83.CrossRef
33.
go back to reference Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec–using reputation-based multilayer security to protect MANETs. Computers & Security,31(1), 122–136.CrossRef Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec–using reputation-based multilayer security to protect MANETs. Computers & Security,31(1), 122–136.CrossRef
34.
go back to reference Kumari, S. V., & Paramasivan, B. (2015, April). Ant based defense mechanism for selective forwarding attack in MANET. In Data engineering workshops (ICDEW), 2015 31st IEEE international conference on (pp. 92–97). Piscataway: IEEE. Kumari, S. V., & Paramasivan, B. (2015, April). Ant based defense mechanism for selective forwarding attack in MANET. In Data engineering workshops (ICDEW), 2015 31st IEEE international conference on (pp. 92–97). Piscataway: IEEE.
35.
go back to reference Fahad, T., Djenouri, D., & Askwith, R. (2007, August). On detecting packets droppers in manet: A novel low cost approach. In Information assurance and security, 2007. IAS 2007. Third international symposium on (pp. 56–64). Piscataway: IEEE. Fahad, T., Djenouri, D., & Askwith, R. (2007, August). On detecting packets droppers in manet: A novel low cost approach. In Information assurance and security, 2007. IAS 2007. Third international symposium on (pp. 56–64). Piscataway: IEEE.
36.
go back to reference Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K., & Banerjee, P. K. (2012, August). Two-level secure re-routing (TSR) in mobile ad hoc networks. In Advances in mobile network, communication and its applications (MNCAPPS), 2012 international conference on (pp. 119–122). Piscataway: IEEE. Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K., & Banerjee, P. K. (2012, August). Two-level secure re-routing (TSR) in mobile ad hoc networks. In Advances in mobile network, communication and its applications (MNCAPPS), 2012 international conference on (pp. 119–122). Piscataway: IEEE.
37.
go back to reference Shi, F., Liu, W., Jin, D., & Song, J. (2014). A cluster-based countermeasure against blackhole attacks in MANETs. Telecommunication Systems,57(2), 119–136.CrossRef Shi, F., Liu, W., Jin, D., & Song, J. (2014). A cluster-based countermeasure against blackhole attacks in MANETs. Telecommunication Systems,57(2), 119–136.CrossRef
38.
go back to reference Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013, April). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Information & communication technologies (ICT), 2013 IEEE conference on (pp. 479–484). Piscataway: IEEE. Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013, April). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Information & communication technologies (ICT), 2013 IEEE conference on (pp. 479–484). Piscataway: IEEE.
39.
go back to reference Singh, M., & Singh, P. (2016, August). Black hole attack detection in MANET using mobile trust points with clustering. In International conference on smart trends for information technology and computer communications (pp. 565–572). Singapore: Springer. Singh, M., & Singh, P. (2016, August). Black hole attack detection in MANET using mobile trust points with clustering. In International conference on smart trends for information technology and computer communications (pp. 565–572). Singapore: Springer.
40.
go back to reference Su, M. Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications,34(1), 107–117.CrossRef Su, M. Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications,34(1), 107–117.CrossRef
41.
go back to reference Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering,40(2), 530–538.CrossRef Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering,40(2), 530–538.CrossRef
42.
go back to reference Barani, F. (2014). A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system. In Intelligent systems (ICIS), 2014 Iranian conference on (pp. 1–6). Piscataway: IEEE. Barani, F. (2014). A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system. In Intelligent systems (ICIS), 2014 Iranian conference on (pp. 1–6). Piscataway: IEEE.
43.
go back to reference Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray-hole attack in MANET. Wireless Networks,24(2), 565–579.CrossRef Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray-hole attack in MANET. Wireless Networks,24(2), 565–579.CrossRef
44.
go back to reference Lee, S., Han, B., & Shin, M. (2002). Robust routing in wireless ad hoc networks. In Parallel processing workshops, 2002. Proceedings international conference on (pp. 73–78). Piscataway: IEEE. Lee, S., Han, B., & Shin, M. (2002). Robust routing in wireless ad hoc networks. In Parallel processing workshops, 2002. Proceedings international conference on (pp. 73–78). Piscataway: IEEE.
45.
go back to reference Tamilselvan, L., & Sankaranarayanan, V. (2007). Prevention of blackhole attack in MANET. In Wireless broadband and ultra wideband communications, 2007. AusWireless 2007. The 2nd international conference on (pp. 21–21). Piscataway: IEEE. Tamilselvan, L., & Sankaranarayanan, V. (2007). Prevention of blackhole attack in MANET. In Wireless broadband and ultra wideband communications, 2007. AusWireless 2007. The 2nd international conference on (pp. 21–21). Piscataway: IEEE.
46.
go back to reference Dokurer, S., Erten, Y. M., & Acar, C. E. (2007). Performance analysis of ad-hoc networks under black hole attacks. In SoutheastCon, proceedings on (pp. 148–153). Piscataway: IEEE. Dokurer, S., Erten, Y. M., & Acar, C. E. (2007). Performance analysis of ad-hoc networks under black hole attacks. In SoutheastCon, proceedings on (pp. 148–153). Piscataway: IEEE.
47.
go back to reference Lu, S., Li, L., Lam, K. Y., & Jia, L. (2009). SAODV: A MANET routing protocol that can withstand black hole attack. In Computational intelligence and security, 2009. CIS’09. International conference on (Vol. 2, pp. 421–425). Piscataway: IEEE. Lu, S., Li, L., Lam, K. Y., & Jia, L. (2009). SAODV: A MANET routing protocol that can withstand black hole attack. In Computational intelligence and security, 2009. CIS’09. International conference on (Vol. 2, pp. 421–425). Piscataway: IEEE.
48.
go back to reference Mistry, N., Jinwala, D. C., & Zaveri, M. (2010). Improving AODV protocol against blackhole attacks. In Proceedings of the international multi conference of engineers and computer scientists (Vol. 2). Mistry, N., Jinwala, D. C., & Zaveri, M. (2010). Improving AODV protocol against blackhole attacks. In Proceedings of the international multi conference of engineers and computer scientists (Vol. 2).
49.
go back to reference Ameza, F., Assam, N., & Beghdad, R. (2010). Defending AODV routing protocol against the black hole attack. International Journal of Computer Science and Information Security,8(2), 112–117. Ameza, F., Assam, N., & Beghdad, R. (2010). Defending AODV routing protocol against the black hole attack. International Journal of Computer Science and Information Security,8(2), 112–117.
50.
go back to reference Yerneni, R., & Sarje, A. K. (2012). Enhancing performance of AODV against black hole attack. In Proceedings of the CUBE international information technology conference (pp. 857–862). New York City: ACM. Yerneni, R., & Sarje, A. K. (2012). Enhancing performance of AODV against black hole attack. In Proceedings of the CUBE international information technology conference (pp. 857–862). New York City: ACM.
51.
go back to reference Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal,9(1), 65–75.CrossRef Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal,9(1), 65–75.CrossRef
52.
go back to reference Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks,21(8), 2781–2798.CrossRef Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks,21(8), 2781–2798.CrossRef
53.
go back to reference Gurung, S., & Saluja, K. K. (2014). Mitigating impact of blackhole attack in MANET. In International conference on recent trends in information, telecommunication and computing, ITC (pp. 229-237). Gurung, S., & Saluja, K. K. (2014). Mitigating impact of blackhole attack in MANET. In International conference on recent trends in information, telecommunication and computing, ITC (pp. 229-237).
54.
go back to reference Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks,113, 94–110.CrossRef Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks,113, 94–110.CrossRef
Metadata
Title
A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability
Publication date
27-02-2019
Published in
Wireless Networks / Issue 3/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-01966-z

Other articles of this Issue 3/2020

Wireless Networks 3/2020 Go to the issue