Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Packet drop attack

Known as: Blackhole attack 
In computer networking, a packet drop attack or blackhole attack is a type of denial-of-service attack in which a router that is supposed to relay… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The importance of phasor measurement unit (PMU) or synchrophasor data towards the functioning of real-time monitoring and control… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 5
  • figure 4
Is this relevant?
2014
2014
Routers in any infrastructure are most interesting part for any attacker because almost whole traffic flows through these and… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The proliferation of Mobile Adhoc Networks (MANETs) help to realize the nomadic computing paradigm with ubiquitous access. Though… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 4
  • figure 5
Is this relevant?
2010
2010
Mobile Adhoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing… Expand
  • figure 1
  • table 1
  • figure 4
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
A mobile ad hoc network (MANET) is a self-organizing, self-configuring confederation of wireless systems. MANET devices join and… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a simulation-based study of the impacts of different types of attacks on mesh-based multicast in mobile ad hoc… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a… Expand
  • figure 2
  • figure 3
  • figure 1
  • table 1
  • table 3
Is this relevant?