TY - JOUR
T1 - Black hole along with other attacks in MANETs
T2 - A survey
AU - Tseng, Fan Hsun
AU - Chiang, Hua Pei
AU - Chao, Han Chieh
N1 - Funding Information:
This research was partly funded by the Ministry of Science and Technology (MOST), Taiwan, R.O.C. under grant (No. 105-2221-E-197-010-MY2, No. 106-2511-S-259-001-MY3, and No. 106-2811-S-259-001).
Publisher Copyright:
© 2018 KIPS.
PY - 2018
Y1 - 2018
N2 - Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.
AB - Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.
UR - http://www.scopus.com/inward/record.url?scp=85042766874&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85042766874&partnerID=8YFLogxK
U2 - 10.3745/JIPS.03.0090
DO - 10.3745/JIPS.03.0090
M3 - Article
AN - SCOPUS:85042766874
SN - 1976-913X
VL - 14
SP - 56
EP - 78
JO - Journal of Information Processing Systems
JF - Journal of Information Processing Systems
IS - 1
ER -