Corpus ID: 55993527

Black Hole Attacks in Mobile Ad Hoc Networks

@article{Amiri2015BlackHA,
  title={Black Hole Attacks in Mobile Ad Hoc Networks},
  author={R. Amiri and M. K. Rafsanjani and Ehsan Khosravi and H. Amiri},
  journal={journal of new results in science},
  year={2015},
  volume={4},
  pages={46-57}
}
  • R. Amiri, M. K. Rafsanjani, +1 author H. Amiri
  • Published 2015
  • Computer Science
  • journal of new results in science
  • Mobile ad hoc networks are used on different occasions, especially during crises. In risk and crisis management, communications is considered vital. With regard to their features, mobile ad hoc networks can be very helpful when dealing with a crisis such as flood, earthquake, war, etc. Security is nowadays considered as one of the main concerns in mobile ad hoc networks. And blac khole attack is among the most important threats of mobile ad hoc networks, where the malicious node places itself… CONTINUE READING
    1 Citations

    References

    SHOWING 1-10 OF 23 REFERENCES
    Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection
    • 105
    • Highly Influential
    • PDF
    A Novel Security Approach for Detecting Black Hole Attack in MANET
    • 37
    Geographic routing used in MANET for black hole detection
    • 6
    Enhancing data security in ad hoc networks based on multipath routing
    • 48
    A survey on detecting black hole attack in AODV-based mobile ad hoc networks
    • R. A. Raja Mahmood, A.I. Khan
    • Computer Science
    • 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies
    • 2007
    • 71
    • PDF
    Detecting blackhole attacks on DSR-based mobile ad hoc networks
    • 35
    Preventing Blackhole Attack in DSR-Based Wireless Ad Hoc Networks
    • 1
    Black Hole Combat Using Node Stability System in MANET
    • 4
    A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks
    • 7
    • Highly Influential
    Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks
    • 86
    • PDF