Corpus ID: 713964

Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet

@article{Raj2009DpraodvAD,
  title={Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet},
  author={Payal N. Raj and Prashant B. Swadas},
  journal={ArXiv},
  year={2009},
  volume={abs/0909.2371}
}
  • Payal N. Raj, Prashant B. Swadas
  • Published 2009
  • Computer Science
  • ArXiv
  • Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a multifence security solution that achieves both broad protection and desirable network performance. MANETs are vulnerable to various attacks, blackhole, is one of the possible attacks. Black hole is a type of… CONTINUE READING

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 221 CITATIONS

    Prevention / Detection Methods of Black Hole Attack : A Review

    VIEW 4 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Analysis of Various Malicious Node Detection Techniques: A Review

    VIEW 4 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Blackhole attack detection and prevention by real time monitoring

    VIEW 6 EXCERPTS
    CITES METHODS
    HIGHLY INFLUENCED

    A Review on Black Hole Attack in MANETs

    VIEW 10 EXCERPTS
    CITES RESULTS
    HIGHLY INFLUENCED

    Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network

    VIEW 10 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    A survey of black hole attacks in wireless mobile ad hoc networks

    VIEW 8 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2010
    2020

    CITATION STATISTICS

    • 19 Highly Influenced Citations

    • Averaged 18 Citations per year from 2017 through 2019

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 16 REFERENCES

    Real-time intrusion detection for ad hoc networks

    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks

    VIEW 2 EXCERPTS
    HIGHLY INFLUENTIAL

    Routing Over Multi-Hop Wireless Network of Mobile Computers

    VIEW 2 EXCERPTS
    HIGHLY INFLUENTIAL

    The ns Manual

    • 2006

    Black hole attack in wireless ad hoc networks

    • M. A. Shurman, S. M. Yoo, S. Park
    • ACM 42 Southeast Conference (ACMSE’04), pp. 96-97, Apr. 2004.
    • 2004
    VIEW 1 EXCERPT

    Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks

    • D. B. Johnson, A. Perrig
    • Proc . 4 th IEEE Workshop on Mobile Computing Systems and Applications
    • 2003

    A secure routing protocol for ad hoc networks

    VIEW 1 EXCERPT