摘要
The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the existing solutions and discuss the state-of-the-art routing methods. We not only classify these proposals into single black hole attack and collaborative black hole attack but also analyze the categories of these solutions and provide a comparison table. We expect to furnish more researchers with a detailed work in anticipation.
| 原文 | English |
|---|---|
| 文章編號 | 4 |
| 頁(從 - 到) | 1-16 |
| 頁數 | 16 |
| 期刊 | Human-centric Computing and Information Sciences |
| 卷 | 1 |
| 發行號 | 1 |
| DOIs | |
| 出版狀態 | Published - 2011 12月 1 |
All Science Journal Classification (ASJC) codes
- 一般電腦科學
指紋
深入研究「A survey of black hole attacks in wireless mobile ad hoc networks」主題。共同形成了獨特的指紋。引用此
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver