Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Security is a critical problem in implementing mobile ad hoc networks (MANETs) because of their vulnerability to routing attacks. Although providing authentication to packets at each stage can reduce the risk, routing attacks may still occur due to the delay in time of reporting and analyzing the pa...
| Main Authors: | Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer Nature Switzerland
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/24827/ http://umpir.ump.edu.my/id/eprint/24827/12/Detection%20of%20Black%20Hole%20Attacks%20in%20Mobile%20Ad%20Hoc%20Networks%20ebook%20ecollib1.pdf |
Similar Items
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
by: Mustafa, Ahmed Sudad
Published: (2017)
by: Mustafa, Ahmed Sudad
Published: (2017)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
Enhance route discovery Ad hoc On-demand Distance Vector (ERDA) protocol for black hole attack mitigation / Zaid Ahmad
by: Ahmad, Zaid
Published: (2014)
by: Ahmad, Zaid
Published: (2014)
A review current routing attacks in mobile ad-hoc networks
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
Effective black hole attacks in MANETs
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015)
by: Enshaei, Mehdi
Published: (2015)
Routing in mobile Ad Hoc Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Mobile ad hoc network overview
by: Ismail, Ishak, et al.
Published: (2007)
by: Ismail, Ishak, et al.
Published: (2007)
Collaborative caching discovery management in mobile ad hoc networks environments
by: Alshahrani, Hussain, et al.
Published: (2023)
by: Alshahrani, Hussain, et al.
Published: (2023)
Upgrading performance of Ad Hoc On-demand Distance Vector (AODV) routing protocol in mobile ad hoc networks
by: Ahmad, Noor Azlan, et al.
Published: (2007)
by: Ahmad, Noor Azlan, et al.
Published: (2007)
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
by: Gurusamy, Gobi
Published: (2006)
by: Gurusamy, Gobi
Published: (2006)
Introduction to QoS approaches in mobile ad hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Classifications of multicast routing In mobile ad hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
An alternative routing mechanisms for mobile ad-hoc networks
by: Ali, Awos Khazal
Published: (2008)
by: Ali, Awos Khazal
Published: (2008)
A friend mechanism for mobile ad hoc networks
by: Abd. Razak, Shukor, et al.
Published: (2008)
by: Abd. Razak, Shukor, et al.
Published: (2008)
Indoor Location Tracking in Mobile Ad Hoc Network (MANET) using RSSI
by: Ali, Ahmed, et al.
Published: (2004)
by: Ali, Ahmed, et al.
Published: (2004)
Renormalized vacuum polarization on rotating warped AdS3 black holes
by: Ferreira, Hugo R.C., et al.
Published: (2015)
by: Ferreira, Hugo R.C., et al.
Published: (2015)
Mobile ad hoc network testbed using mobile robot technology
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
Integrating mobile ad hoc network into mobile IPv6 network
by: Ali, Adel, et al.
Published: (2004)
by: Ali, Adel, et al.
Published: (2004)
Investigation of route optimization for mobile ad hoc NEMO (MANEMO) based proposals
by: Mosa, Ahmed A., et al.
Published: (2011)
by: Mosa, Ahmed A., et al.
Published: (2011)
Protocols for secure routing and transmission in mobile ad hoc network: a review
by: Mahdi Ahmed, Salwa Aqeel, et al.
Published: (2013)
by: Mahdi Ahmed, Salwa Aqeel, et al.
Published: (2013)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Securing Mobile Ad hoc Domain by Immune-Inspired Mechanism
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Load-balancing technique in clustered mobile Ad-hoc networks
by: AlGhafran, Labdah, et al.
Published: (2014)
by: AlGhafran, Labdah, et al.
Published: (2014)
A mobile ad-hoc network (MANET) implementation on android
by: Mohammed, Mohammed Khalid Hassan
Published: (2014)
by: Mohammed, Mohammed Khalid Hassan
Published: (2014)
Position-based multicast routing in mobile ad hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2012)
by: Qabajeh, Mohammad M., et al.
Published: (2012)
A survey on scalable multicasting in mobile ad hoc
networks
by: Qabajeh, Mohammad M., et al.
Published: (2015)
by: Qabajeh, Mohammad M., et al.
Published: (2015)
Calibration on co-located ad-hoc multi mobile system
by: Teo, Rhun Ming, et al.
Published: (2016)
by: Teo, Rhun Ming, et al.
Published: (2016)
LI-AODV: lifetime improving AODV routing for detecting and removing black-hole attack from VANET
by: ABDULKADER, ZAID A., et al.
Published: (2017)
by: ABDULKADER, ZAID A., et al.
Published: (2017)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
White Hole-Black Hole Algorithm
by: Suad Khairi, Mohammed, et al.
Published: (2016)
by: Suad Khairi, Mohammed, et al.
Published: (2016)
Simulation analysis of ad-hoc on-demand distance vector routing protocol performance in mobile AD HOC network using taguchi design approach
by: Mohamed, Hazura, et al.
Published: (2008)
by: Mohamed, Hazura, et al.
Published: (2008)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Trust and resource oriented communication scheme in mobile ad hoc networks
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
Practical mobile ad hoc networks for large scale cattle monitoring
by: Wietrzyk, Bartosz
Published: (2008)
by: Wietrzyk, Bartosz
Published: (2008)
Performance analysis of vehicular ad hoc networks with realistic mobility pattern
by: Chan, Wai Foo, et al.
Published: (2007)
by: Chan, Wai Foo, et al.
Published: (2007)
Similar Items
-
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014) -
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
by: Mustafa, Ahmed Sudad
Published: (2017) -
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011) -
Enhance route discovery Ad hoc On-demand Distance Vector (ERDA) protocol for black hole attack mitigation / Zaid Ahmad
by: Ahmad, Zaid
Published: (2014) -
A review current routing attacks in mobile ad-hoc networks
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)