Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,393,595 papers from all fields of science
Search
Sign In
Create Free Account
Packet drop attack
Known as:
Blackhole attack
In computer networking, a packet drop attack or blackhole attack is a type of denial-of-service attack in which a router that is supposed to relay…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Anycast
Black hole (networking)
Denial-of-service attack
Broader (1)
Routing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks
A. Giaretta
,
S. Balasubramaniam
,
M. Conti
IEEE Transactions on Information Forensics and…
2016
Corpus ID: 11236719
The emergence of molecular communication has provided an avenue for developing biological nanonetworks. Synthetic biology is a…
Expand
2015
2015
Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm
Neeraj Arya
,
Upendra Singh
,
Sushma Singh
Journées Francophones d'Ingénierie des…
2015
Corpus ID: 40560940
A mobile ad-hoc network is a wireless network such that nodes are move dynamically in network. In OSI network layer there is lot…
Expand
2015
2015
Detecting and overcoming blackhole attack in mobile Adhoc Network
Sakshi Jain
,
Ajay Khuteta
International Conference on Green Computing and…
2015
Corpus ID: 16201877
A mobile Adhoc Network (MANET) is a huddle of autonomous mobile nodes which dynamically forms a temporary multi-hoped radio…
Expand
2014
2014
Trust Based Secure on Demand Routing Protocol (TSDRP) for MANETs
A. Aggarwal
,
S. Gandhi
,
Nirbhay Chaubey
,
K. Jani
Fourth International Conference on Advanced…
2014
Corpus ID: 18868666
Mobile Ad Hoc Networks (MANETs) are collections of mobile nodes that can communicate with one another using multihop wireless…
Expand
Review
2012
Review
2012
Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs
Humaira Ehsan
,
F. A. Khan
IEEE 11th International Conference on Trust…
2012
Corpus ID: 18232710
From the security perspective Mobile Ad hoc Networks (MANETs) are amongst the most challenging research areas and one of the key…
Expand
Highly Cited
2010
Highly Cited
2010
Improving AODV Protocol against Blackhole Attacks
N. Mistry
,
D. Jinwala
,
M. Zaveri
2010
Corpus ID: 493873
The proliferation of Mobile Adhoc Networks (MANETs) help to realize the nomadic computing paradigm with ubiquitous access. Though…
Expand
Highly Cited
2009
Highly Cited
2009
Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet
Payal N. Raj
,
P. Swadas
arXiv.org
2009
Corpus ID: 713964
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to…
Expand
Highly Cited
2007
Highly Cited
2007
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
S. Kurosawa
,
Hidehisa Nakayama
,
N. Kato
,
A. Jamalipour
,
Y. Nemoto
International Journal of Network Security
2007
Corpus ID: 17871767
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a…
Expand
Highly Cited
2007
Highly Cited
2007
Prevention of Blackhole Attack in MANET
L. Tamilselvan
,
V. Sankaranarayanan
International Conference on Wireless Broadband…
2007
Corpus ID: 23058853
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of…
Expand
Highly Cited
2002
Highly Cited
2002
Robust routing in wireless ad hoc networks
Seungjoon Lee
,
Bo Han
,
Minho Shin
Proceedings. International Conference on Parallel…
2002
Corpus ID: 11234364
A wireless ad hoc network is a collection of mobile nodes with no fixed infrastructure. The absence of a central authorization…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE