A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit <a rel="external noopener" href="http://pdfs.semanticscholar.org/ad17/c4902f8466fca90f79a2158373c8719ab249.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
<span title="">2015</span>
<i title="Hindawi Limited">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nxzqpsogkbe55mjq33syzghf2e" style="color: black;">The Scientific World Journal</a>
</i>
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2015/715820">doi:10.1155/2015/715820</a>
<a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/26495430">pmid:26495430</a>
<a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC4606073/">pmcid:PMC4606073</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xnnh7n3ik5d4bo42qmqqb6zdhq">fatcat:xnnh7n3ik5d4bo42qmqqb6zdhq</a>
</span>
more »
... in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190302011337/http://pdfs.semanticscholar.org/ad17/c4902f8466fca90f79a2158373c8719ab249.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/ad/17/ad17c4902f8466fca90f79a2158373c8719ab249.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2015/715820">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
hindawi.com
</button>
</a>
<a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4606073" title="pubmed link">
<button class="ui compact blue labeled icon button serp-button">
<i class="file alternate outline icon"></i>
pubmed.gov
</button>
</a>