[PDF][PDF] Effect of Black hole Attack on MANET routing protocols

J Kumar, M Kulkarni, D Gupta - International Journal of Computer …, 2013 - academia.edu
Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure
against attacks by the malicious nodes. In this paper we have analyzed the effects of Black …

Method for detecting abnormal activity in a group of mobile robots

E Basan, A Basan, A Nekrasov - Sensors, 2019 - mdpi.com
The range of attacks implemented on wireless networks is quite wide. To avoid or reduce the
likelihood of an attack, it is necessary to use various defense mechanisms. Existing …

Evaluating and detecting internal attacks in a mobile robotic network

E Basan, A Basan, O Makarevich - 2018 International Conference on …, 2018 - computer.org
In this paper we consider the problem of the need for deep traffic analysis to detect attacks
on a network of mobile robots, as well as to assess their effectiveness. The object of the …

[PDF][PDF] A robust approach to detect and prevent network layer attacks in MANETS

GS Mamatha, SC Sharma - International Journal of Computer Science and …, 2010 - Citeseer
A dynamic wireless network that is formed without any pre-existing infrastructure, in which
every node can act as a router is called a mobile ad hoc network (MANET). Since MANETS …

Effects of black hole attack on manet using reactive and proactive protocols

I Ullah, S Anwar - … Journal of Computer Science Issues (IJCSI), 2013 - search.proquest.com
Wireless networks are gaining popularity to its peak in the present era and therefore
appealing the users for wireless connectivity irrespective of their geographic position. There …

Intrusion detection technique for black hole attack in mobile ad hoc networks

S Kumar, K Dutta - International Journal of Information …, 2015 - inderscienceonline.com
A black hole attack is particularly harmful against routing in mobile ad hoc networks where a
malicious node tries to capture the path toward itself by falsely claiming a fresh and shortest …

A distributed hierarchical key management scheme for mobile ad hoc networks

SP John, P Samuel - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
In MANET, when a node is compromised it tends to reveal the other node's key information
and corrupts the whole network. The scalable method of cryptographic key management …

[PDF][PDF] Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network

PK Sharma, S Mewada, P Nigam - International Journal of Scientific …, 2013 - ijsrnsc.org
Revised: 25 September 2013 Accepted: 16 October 2013 Published: 30 October 2013
Abstract-Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self …

Survivability prediction of ad hoc networks under attack

JC Acosta, BG Medina - MILCOM 2012-2012 IEEE Military …, 2012 - ieeexplore.ieee.org
Survivability analysis focuses on the ability of network entities to function during incidents
such as attacks. Currently, testing survivability of ad hoc networks consists of running …

Detection of anomalies in the robotic system based on the calculation of Kullback-Leibler divergence

E Basan, A Basan, O Makarevich - … International Conference on …, 2019 - ieeexplore.ieee.org
This study is devoted to the problem of detecting anomalous behavior of nodes of a robotic
system based on network traffic analysis. This article addresses the issue of analyzing …