A survey of black hole attacks in wireless mobile ad hoc networks

FH Tseng, LD Chou, HC Chao - Human-centric Computing and …, 2011 - Springer
The black hole attack is one of the well-known security threats in wireless mobile ad hoc
networks. The intruders utilize the loophole to carry out their malicious behaviors because …

A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

GM Borkar, AR Mahajan - International Journal of …, 2020 - inderscienceonline.com
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in
modern technology for transmitting the packets from source node to destination node. The …

Defence against black hole and selective forwarding attacks for medical WSNs in the IoT

A Mathur, T Newe, M Rao - Sensors, 2016 - mdpi.com
Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in
hospital and home environments. These systems consist of a variety of different …

A modified algorithm to improve security and performance of AODV protocol against black hole attack

S Shahabi, M Ghazvini, M Bakhtiarian - Wireless Networks, 2016 - Springer
Ad Hoc network is a temporal network which is managed by autonomous nodes which have
the ability to communicate with each other without having fixed network infrastructure or any …

An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET

A Dorri - Wireless Networks, 2017 - Springer
Abstract Mobile Ad hoc Network (MANET) is a self-configurable, self-maintenance network
with wireless, mobile nodes. Special features of MANET like dynamic topology, hop-by-hop …

[Retracted] A Low‐Latency and High‐Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)

D Ramachandran, V Rajeev Ratna… - Security and …, 2022 - Wiley Online Library
Security in MANETs is a highly contentious topic in the field of network management. The
availability and functionality of a MANET might be compromised by a variety of attacks. One …

Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks

Q Yaseen, F Albalas, Y Jararwah… - Transactions on …, 2018 - Wiley Online Library
Selective forwarding is a major problem in wireless sensor networks (WSNs). The nature of
sensor environments and the sensitivity of collected measurements in some fields such as …

An enhanced AODV protocol for avoiding black holes in MANET

QM Yaseen, M Aldwairi - Procedia Computer Science, 2018 - Elsevier
Black hole attack is one of the well-known attacks on Mobile Ad hoc Networks, MANET. This
paper discusses this problem and proposes a new approach based on building a global …

A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust

D Rajesh, DG Kiruba - Peer-to-Peer Networking and Applications, 2021 - Springer
Smart Dust consists of several wireless mobile smart dust nodes which animatedly
broadcast information amongst themselves without dependence of basestation. Smart Dust …

An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks

S Behzad, R Fotohi, JH Balov, MJ Rabipour - arXiv preprint arXiv …, 2020 - arxiv.org
MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by
autonomous nodes, which have the ability to communicate with each other without having …