ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks
IEICE Transactions on Communications
◽
10.1587/transcom.e98.b.422
◽
2015
◽
Vol E98.B
(3)
◽
pp. 422-436
Author(s):
Firoz AHMED
◽
Seokhoon YOON
◽
Hoon OH
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Proof Verification
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
A Bullet-Proof Verification Using Distributed Watchdogs (BPV-DW) to Detect Black Hole Attack in Mobile Ad Hoc Networks
Advances in Grid and Pervasive Computing - Lecture Notes in Computer Science
◽
10.1007/978-3-642-30767-6_27
◽
2012
◽
pp. 312-322
Author(s):
Firoz Ahmed
◽
Seok Hoon Yoon
◽
Hoon Oh
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Proof Verification
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks
Ubiquitous Intelligence and Computing - Lecture Notes in Computer Science
◽
10.1007/978-3-642-23641-9_35
◽
2011
◽
pp. 435-449
◽
Cited By ~ 1
Author(s):
Firoz Ahmed
◽
Seokhoon Yoon
◽
Hoon Oh
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Proof Verification
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Mobile Ad-hoc Networks Security Aspects in Black Hole Attack
2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)
◽
10.1109/iceca.2018.8474629
◽
2018
◽
Author(s):
Ventrapragada Sree Pooja
◽
Todupunoori Rohit
◽
Nagulapally Manisha Reddy
◽
S Sudeshna
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Black Hole Attack in Mobile Ad Hoc Networks: Challenges and Directions
International Journal of Computer Applications
◽
10.5120/ijca2021921672
◽
2021
◽
Vol 183
(29)
◽
pp. 1-7
Author(s):
Noble Arden
◽
Lily Bensah
◽
Baidenger Agyekum
◽
Carlos Ankora
◽
Gerald Tietaa
◽
...
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Trust Based Security Model to Withstand Against Black Hole and Grey Hole Attacks In Military Based Mobile Ad Hoc Networks
International Journal of Mobile Network Communications & Telematics
◽
10.5121/ijmnct.2016.6101
◽
2016
◽
Vol 6
(1)
◽
pp. 1-14
◽
Cited By ~ 1
Author(s):
Sivagurunathan S
◽
Prathapchandran K
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Survey OF Black Hole Detection Policies IN Mobile AD HOC Networks
International Journal of Future Generation Communication and Networking
◽
10.14257/ijfgcn.2016.9.12.27
◽
2016
◽
Vol 9
(12)
◽
pp. 295-304
Author(s):
Kanchan Bala
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Hole Detection
Download Full-text
Detecting black-hole attack in mobile ad hoc networks
5th European Personal Mobile Communications Conference 2003
◽
10.1049/cp:20030303
◽
2003
◽
Cited By ~ 12
Author(s):
Bo Sun
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Clustering of mobile ad hoc networks: An approach for black hole prevention
2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
◽
10.1109/icicict.2014.6781308
◽
2014
◽
Cited By ~ 3
Author(s):
Jitendra Savner
◽
Vinit Gupta
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Black hole attack in mobile Ad Hoc networks
Proceedings of the 42nd annual Southeast regional conference on - ACM-SE 42
◽
10.1145/986537.986560
◽
2004
◽
Cited By ~ 139
Author(s):
Mohammad Al-Shurman
◽
Seong-Moo Yoo
◽
Seungjin Park
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks
International Journal of Communication Systems
◽
10.1002/dac.3518
◽
2018
◽
Vol 31
(6)
◽
pp. e3518
◽
Cited By ~ 3
Author(s):
Vasantha Sandhya Venu
◽
Damodaram Avula
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close