Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or packet drop attack is one example of a harmful attack in mobile ad hoc networks. In this study, we implement a ser...
| Main Authors: | Raja Mahmood, Raja Azlina, Hussin, Masnida, Manshor, Noridayu, Khan, A. I. |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
IEEE (IEEE Xplore)
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/38885/ |
Similar Items
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Effective black hole attacks in MANETs
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
by: Mustafa, Ahmed Sudad
Published: (2017)
by: Mustafa, Ahmed Sudad
Published: (2017)
Enhance route discovery Ad hoc On-demand Distance Vector (ERDA) protocol for black hole attack mitigation / Zaid Ahmad
by: Ahmad, Zaid
Published: (2014)
by: Ahmad, Zaid
Published: (2014)
A review current routing attacks in mobile ad-hoc networks
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
by: Raja Mahmood, Raja Azlina, et al.
Published: (2012)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2012)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Routing in mobile Ad Hoc Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015)
by: Enshaei, Mehdi
Published: (2015)
Mobile ad hoc network overview
by: Ismail, Ishak, et al.
Published: (2007)
by: Ismail, Ishak, et al.
Published: (2007)
Impact of node inter-domain movement on MANETs performance
by: Raja Mahmood, Raja Azlina, et al.
Published: (2015)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2015)
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016)
by: Ahmed, Dana Hasan, et al.
Published: (2016)
Integrating mobile ad hoc network into mobile IPv6 network
by: Ali, Adel, et al.
Published: (2004)
by: Ali, Adel, et al.
Published: (2004)
Introduction to QoS approaches in mobile ad hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Classifications of multicast routing In mobile ad hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
An alternative routing mechanisms for mobile ad-hoc networks
by: Ali, Awos Khazal
Published: (2008)
by: Ali, Awos Khazal
Published: (2008)
A friend mechanism for mobile ad hoc networks
by: Abd. Razak, Shukor, et al.
Published: (2008)
by: Abd. Razak, Shukor, et al.
Published: (2008)
Upgrading performance of Ad Hoc On-demand Distance Vector (AODV) routing protocol in mobile ad hoc networks
by: Ahmad, Noor Azlan, et al.
Published: (2007)
by: Ahmad, Noor Azlan, et al.
Published: (2007)
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
by: Gurusamy, Gobi
Published: (2006)
by: Gurusamy, Gobi
Published: (2006)
Mobile ad hoc network testbed using mobile robot technology
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
Trust and resource oriented communication scheme in mobile ad hoc networks
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Load-balancing technique in clustered mobile Ad-hoc networks
by: AlGhafran, Labdah, et al.
Published: (2014)
by: AlGhafran, Labdah, et al.
Published: (2014)
A mobile ad-hoc network (MANET) implementation on android
by: Mohammed, Mohammed Khalid Hassan
Published: (2014)
by: Mohammed, Mohammed Khalid Hassan
Published: (2014)
Position-based multicast routing in mobile ad hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2012)
by: Qabajeh, Mohammad M., et al.
Published: (2012)
A survey on scalable multicasting in mobile ad hoc
networks
by: Qabajeh, Mohammad M., et al.
Published: (2015)
by: Qabajeh, Mohammad M., et al.
Published: (2015)
White Hole-Black Hole Algorithm
by: Suad Khairi, Mohammed, et al.
Published: (2016)
by: Suad Khairi, Mohammed, et al.
Published: (2016)
LI-AODV: lifetime improving AODV routing for detecting and removing black-hole attack from VANET
by: ABDULKADER, ZAID A., et al.
Published: (2017)
by: ABDULKADER, ZAID A., et al.
Published: (2017)
An efficient routing protocol for mobile ad hoc networks with Neighbor Awareness and Multicasting
by: Pathan, Al-Sakib Khan, et al.
Published: (2004)
by: Pathan, Al-Sakib Khan, et al.
Published: (2004)
NAMP: Neighbor Aware Multicast Routing Protocol for mobile ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Practical mobile ad hoc networks for large scale cattle monitoring
by: Wietrzyk, Bartosz
Published: (2008)
by: Wietrzyk, Bartosz
Published: (2008)
Performance analysis of vehicular ad hoc networks with realistic mobility pattern
by: Chan, Wai Foo, et al.
Published: (2007)
by: Chan, Wai Foo, et al.
Published: (2007)
Supporting QoS multicast routing over mobile ad hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Review of multicast QoS routing protocols for mobile ad hoc
networks
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2008)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2008)
The effects of transmission power control in mobile ad-hoc sensor networks
by: Mohamad Nazim, Jambli, et al.
Published: (2012)
by: Mohamad Nazim, Jambli, et al.
Published: (2012)
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
by: Alahdal, Tariq A. A.
Published: (2008)
by: Alahdal, Tariq A. A.
Published: (2008)
A reliable unicast routing protocol for mobile ad hoc network
by: Sargolzaey, Hadi
Published: (2013)
by: Sargolzaey, Hadi
Published: (2013)
Similar Items
-
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019) -
Effective black hole attacks in MANETs
by: Raja Mahmood, Raja Azlina, et al.
Published: (2013) -
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011) -
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
by: Mustafa, Ahmed Sudad
Published: (2017) -
Enhance route discovery Ad hoc On-demand Distance Vector (ERDA) protocol for black hole attack mitigation / Zaid Ahmad
by: Ahmad, Zaid
Published: (2014)