scispace - formally typeset
Journal ArticleDOI

Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems

Ming-Yang Su
- 01 Jan 2011 - 
- Vol. 34, Iss: 1, pp 107-117
TLDR
This study employs ns2 to validate the effect of the proposed IDS deployment, as IDS nodes can rapidly block a malicious node, without false positives, if a proper threshold is set.
About
This article is published in Computer Communications.The article was published on 2011-01-01. It has received 192 citations till now. The article focuses on the topics: Intrusion detection system & Node (networking).

read more

Citations
More filters
Journal ArticleDOI

A survey of black hole attacks in wireless mobile ad hoc networks

TL;DR: This paper surveys the existing solutions of the black hole attack, discusses the state-of-the-art routing methods, and analyzes the categories of these solutions to provide a comparison table.
Proceedings ArticleDOI

DoS Attacks in Mobile Ad Hoc Networks: A Survey

TL;DR: A survey of common Denial-of-Service (DoS) attacks on network layer namely Wormhole attack, Black hole attack and Gray hole attack which are serious threats for MANETs are presented.
Journal ArticleDOI

Modified DSR protocol for detection and removal of selective black hole attack in MANET

TL;DR: A Modified Dynamic Source Routing Protocol (MDSR) to detect and prevent selective black hole attack and an Intrusion Detection System (IDS) where the IDS nodes are set in promiscuous mode only when required, to detect the abnormal difference in the number of data packets being forwarded by a node.
Journal ArticleDOI

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

TL;DR: A structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for MANETs in accordance with technology layout and detection algorithms is provided.
Proceedings ArticleDOI

A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks

TL;DR: A scheme for Ad-hoc On-demand Distance Vector (AODV) protocol is proposed, in which an intermediate node detects the malicious node sending false routing information, and routing packets are used not only to pass routing Information, but also to pass information about malicious nodes.
References
More filters
Proceedings ArticleDOI

Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers

TL;DR: The modifications address some of the previous objections to the use of Bellman-Ford, related to the poor looping properties of such algorithms in the face of broken links and the resulting time dependent nature of the interconnection topology describing the links between the Mobile hosts.

Optimized Link State Routing Protocol (OLSR)

TL;DR: The Optimized Link State Routing protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN and provides optimal routes (in terms of number of hops).
Proceedings ArticleDOI

Ariadne: a secure on-demand routing protocol for ad hoc networks

TL;DR: a secure on-demand routing protocol for ad hoc networks that can be used to connect ad-hoc networks to each other without disrupting existing networks.
Proceedings ArticleDOI

A secure routing protocol for ad hoc networks

TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Related Papers (5)