RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재 SCIE SCOPUS

      Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks = Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

      한글로보기

      https://www.riss.kr/link?id=A105353060

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the...

      Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.

      더보기

      참고문헌 (Reference)

      1 S. Biswas, "Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET" 157-164, 2014

      2 M. N. Sharma, "The black-hole nodes attack in MANET" 546-550, 2012

      3 G. Wahane, "Technique for detection of cooperative black hole attack using true-link in Mobile Ad-hoc Networks" 1428-1434, 2014

      4 G. Wahane, "Technique for detection of cooperative black hole attack in MANET" 1-8, 2013

      5 A. Hawbani, "Sinkoriented tree based data dissemination protocol for mobile sinks wireless sensor networks" 1-12, 2017

      6 F. J. Zhang, "Sinkhole attack detection based on redundancy mechanism in wireless Sensor Networks" ITQM 711-720, 2014

      7 A. Hawbani, "Sensors Grouping Hierarchy Structure for Wireless Sensor Network" 1-18, 2015

      8 S. Ramaswamy, "Prevention of cooperative black hole attack in wireless ad hoc network" 570-575, 2003

      9 H. Weerasinghe, "Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation" 362-367, 2007

      10 A. Siddiqua, "Preventing Black Hole Attacks in MANETs Using Secure Knowledge Algorithm" 421-425, 2015

      1 S. Biswas, "Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET" 157-164, 2014

      2 M. N. Sharma, "The black-hole nodes attack in MANET" 546-550, 2012

      3 G. Wahane, "Technique for detection of cooperative black hole attack using true-link in Mobile Ad-hoc Networks" 1428-1434, 2014

      4 G. Wahane, "Technique for detection of cooperative black hole attack in MANET" 1-8, 2013

      5 A. Hawbani, "Sinkoriented tree based data dissemination protocol for mobile sinks wireless sensor networks" 1-12, 2017

      6 F. J. Zhang, "Sinkhole attack detection based on redundancy mechanism in wireless Sensor Networks" ITQM 711-720, 2014

      7 A. Hawbani, "Sensors Grouping Hierarchy Structure for Wireless Sensor Network" 1-18, 2015

      8 S. Ramaswamy, "Prevention of cooperative black hole attack in wireless ad hoc network" 570-575, 2003

      9 H. Weerasinghe, "Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation" 362-367, 2007

      10 A. Siddiqua, "Preventing Black Hole Attacks in MANETs Using Secure Knowledge Algorithm" 421-425, 2015

      11 S. Dixit, "Introduction to globalization of mobile and wireless communications: today and in 2020;Globalization of Mobile and Wireless Communications" Springer Netherlands 1-8, 2011

      12 S. Malik, "Identifying, Avoidance and Performance Assessment of Black Hole Attack on AODV Protocol in MANET" 6-11, 2014

      13 M. U. Farooq, "Energy Preserving Detection Model for Collaborative Black Hole Attacks in Wireless Sensor Networks" 395-399, 2016

      14 V. A. Hiremani, "Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET" 944-948, 2013

      15 G. S. Bindra, "Detection and removal of co-operative blackhole and grayhole attacks in MANETs" 1-5, 2012

      16 M. Wazid, "Detection and prevention mechanism for black hole attack in wireless sensor network" 576-581, 2013

      17 D. Sheela, "Detecting black hole attack in wireless sensor network using mobile agent" 45-48, 2012

      18 J. Kaur, "BHDP using fuzzy logic algorithm for wireless sensor network under black hole attack" 142-151, 2014

      19 K. Xing, "Attacks and countermeasures in sensor networks: A survey;Network Security" Springer US 251-272, 2010

      20 V. K. Verma, "Analysis of scalability for AODV routing protocol in wireless sensor networks" 748-750, 2014

      21 N. V. Babu, "An optimized weight based clustering algorithm in heterogeneous wireless sensor networks" 185-195, 2012

      22 S. Mahajana, "An energy balanced QoS based cluster head selection strategy for WSN" 189-199, 2014

      23 F. H. Tseng, "A survey of black hole attacks in wireless mobile ad hoc networks" 2011

      24 D. Sheela, "A non-cryptographic method of sink hole attack detection in wireless sensor networks" 527-532, 2011

      25 F. Shi, "A cluster-based countermeasure against black hole attacks in MANET" 119-136, 2014

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      학술지등록 한글명 : KSII Transactions on Internet and Information Systems
      외국어명 : KSII Transactions on Internet and Information Systems
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2013-10-01 평가 등재학술지 선정 (기타) KCI등재
      2011-01-01 평가 등재후보학술지 유지 (기타) KCI등재후보
      2009-01-01 평가 SCOPUS 등재 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.45 0.21 0.37
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.32 0.29 0.244 0.03
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼