Journal ArticleDOI
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
TLDR
This study employs ns2 to validate the effect of the proposed IDS deployment, as IDS nodes can rapidly block a malicious node, without false positives, if a proper threshold is set.About:
This article is published in Computer Communications.The article was published on 2011-01-01. It has received 192 citations till now. The article focuses on the topics: Intrusion detection system & Node (networking).read more
Citations
More filters
Journal ArticleDOI
A survey of black hole attacks in wireless mobile ad hoc networks
TL;DR: This paper surveys the existing solutions of the black hole attack, discusses the state-of-the-art routing methods, and analyzes the categories of these solutions to provide a comparison table.
Proceedings ArticleDOI
DoS Attacks in Mobile Ad Hoc Networks: A Survey
TL;DR: A survey of common Denial-of-Service (DoS) attacks on network layer namely Wormhole attack, Black hole attack and Gray hole attack which are serious threats for MANETs are presented.
Journal ArticleDOI
Modified DSR protocol for detection and removal of selective black hole attack in MANET
TL;DR: A Modified Dynamic Source Routing Protocol (MDSR) to detect and prevent selective black hole attack and an Intrusion Detection System (IDS) where the IDS nodes are set in promiscuous mode only when required, to detect the abnormal difference in the number of data packets being forwarded by a node.
Journal ArticleDOI
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Sunil Kumar,Kamlesh Dutta +1 more
TL;DR: A structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for MANETs in accordance with technology layout and detection algorithms is provided.
Proceedings ArticleDOI
A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks
TL;DR: A scheme for Ad-hoc On-demand Distance Vector (AODV) protocol is proposed, in which an intermediate node detects the malicious node sending false routing information, and routing packets are used not only to pass routing Information, but also to pass information about malicious nodes.
References
More filters
Proceedings ArticleDOI
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
TL;DR: The modifications address some of the previous objections to the use of Bellman-Ford, related to the poor looping properties of such algorithms in the face of broken links and the resulting time dependent nature of the interconnection topology describing the links between the Mobile hosts.
Optimized Link State Routing Protocol (OLSR)
Thomas Clausen,Philippe Jacquet +1 more
TL;DR: The Optimized Link State Routing protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN and provides optimal routes (in terms of number of hops).
Proceedings ArticleDOI
Ariadne: a secure on-demand routing protocol for ad hoc networks
TL;DR: a secure on-demand routing protocol for ad hoc networks that can be used to connect ad-hoc networks to each other without disrupting existing networks.
Proceedings ArticleDOI
A secure routing protocol for ad hoc networks
TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.