A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Title | A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Gurung, S., Chauhan, S. |
Conference Name | 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) |
Date Published | mar |
Keywords | AODV, attack mitigation, black-hole attack mitigation techniques, Blackhole, byzantine attacks, clustering, compositionality, Conferences, cross checking, data packets, delays, destination nodes, high destination sequence number, IDS, MANET, Metrics, mobile ad hoc networks, mobile ad-hoc network, movables nodes, multihop communication, overhearing, Peer-to-peer computing, protocol, pubcrawl, resilience, Resiliency, Routing, Routing protocols, sequence number, source nodes, telecommunication security, telecommunication traffic, wireless networking field |
Abstract | Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless networking field in which the movables nodes operates in distributed manner and collaborates with each other in order to provide the multi-hop communication between the source and destination nodes. Generally, the main assumption considered in the MANET is that each node is trusted node. However, in the real scenario, there are some unreliable nodes which perform black hole attack in which the misbehaving nodes attract all the traffic towards itself by giving false information of having the minimum path towards the destination with a very high destination sequence number and drops all the data packets. In the paper, we have presented different categories for black hole attack mitigation techniques and also presented the summary of various techniques along with its drawbacks that need to be considered while designing an efficient protocol. |
URL | https://ieeexplore.ieee.org/document/8300186/ |
DOI | 10.1109/WiSPNET.2017.8300186 |
Citation Key | gurung_review_2017 |
- Resiliency
- mobile ad-hoc network
- movables nodes
- multihop communication
- overhearing
- Peer-to-peer computing
- protocol
- pubcrawl
- resilience
- mobile ad hoc networks
- Routing
- Routing protocols
- sequence number
- source nodes
- telecommunication security
- telecommunication traffic
- wireless networking field
- AODV
- Metrics
- MANET
- IDS
- high destination sequence number
- destination nodes
- delays
- data packets
- cross checking
- Conferences
- Compositionality
- clustering
- byzantine attacks
- Blackhole
- black-hole attack mitigation techniques
- attack mitigation