Skip to main navigation Skip to search Skip to main content

A survey of black hole attacks in wireless mobile ad hoc networks

Research output: Contribution to journalArticlepeer-review

Abstract

The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the existing solutions and discuss the state-of-the-art routing methods. We not only classify these proposals into single black hole attack and collaborative black hole attack but also analyze the categories of these solutions and provide a comparison table. We expect to furnish more researchers with a detailed work in anticipation.

Original languageEnglish
Article number4
Pages (from-to)1-16
Number of pages16
JournalHuman-centric Computing and Information Sciences
Volume1
Issue number1
DOIs
Publication statusPublished - 2011 Dec 1

All Science Journal Classification (ASJC) codes

  • General Computer Science

Fingerprint

Dive into the research topics of 'A survey of black hole attacks in wireless mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this