Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation

H Weerasinghe, H Fu - Future generation communication and …, 2007 - ieeexplore.ieee.org
… In this paper, we will focus on the black hole and cooperative black hole attacks. The main …
, we implement the simulation of the solutions proposed for the cooperative black hole attacks

Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation

H Weerasinghe, H Fu - International journal of software engineering and …, 2008 - earticle.net
attack is called cooperative black hole attack. In [9], we proposed a solution to identifying and
preventing the cooperative black hole attack… and isolating cooperative black hole nodes. In …

Securing MANET against co-operative black hole attack and its performance analysis-A case study

AS Bhandare, SB Patil - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
… Then we implemented the Blackhole AODV protocol in 10 node scenario by considering …
under “Cooperative Black hole Attack”. In this paper we suggest and simulate one solution in Ns…

Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks

A Baadache, A Belmehdi - arXiv preprint arXiv:1002.1681, 2010 - arxiv.org
… the black hole and the cooperative black hole attacks. Evaluation metrics were considered in
simulation … This solution requires a special material for its implementation. It is dedicated to …

A mechanism for detection of cooperative black hole attack in mobile ad hoc networks

J Sen, S Koilakonda, A Ukil - … , Modelling and Simulation, 2011 - ieeexplore.ieee.org
… The proposed scheme has been evaluated by implementing it in the network simulator ns-2,
and the results demonstrate the effectiveness of the mechanism. As a future scope of work, …

[图书][B] Simulation of Black hole attack in wireless Ad-hoc networks

S Dokurer - 2006 - dokurer.net
… In this thesis, we simulated the black hole attack in various wireless … and have tried to find
a response system in simulations. … Black Hole implementation, we will present the simulations

[PDF][PDF] Defense against co-operative black-hole attack and gray-hole attack in MANET

N Panda, BK Pattanayak - International Journal of Engineering & …, 2018 - researchgate.net
simulator is used for simulation study and XGRAPH for plotting the results. Table 3. shows
the detailed scenario and parameter setting used for this simulation … for implementing Static …

Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks

A Baadache, A Belmehdi - Computer Networks, 2014 - Elsevier
… nodes act in coordination to violate the routing protocol specification or the implemented
We note that the delay, at the beginning of simulation, in the cooperative black hole case is …

A secure routing protocol to prevent cooperative black hole attack in MANET

NW Lo, FL Liu - Intelligent technologies and engineering systems, 2013 - Springer
… to defend against the cooperative black hole attack. Simulation experiments using QualNet
has … (blackholeAODV), and AODV protocol implemented with our detection mechanism (…

Simulation of a trust and reputation based mitigation protocol for a black hole style attack on vanets

G Primiero, A Martorana… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
black hole and the presence of attack is intimated to all using alarm packets. Despite the fact
that this method handles both single and collaborative black hole attacks, … is implemented in …