|
Author | Contribution | Methodology | Advantage | Limitations |
|
CBHDAP Vijayakumar and Somasundaram [33] | Sleuthing and circumventing black hole attacks in MANET | CBHDAP | Optimum results for throughput and detection probability | Does not work for security attacks |
DSIDS Talukdar et al. [34] | BHAODV and DBHAODV protocols | IDS and digital signature | QoS, PDR, overhead is detected | Works well with a limited number of packets and nodes |
FIDS Balan et al. [35] | Black hole node detection | NS-2 simulator | This approach is efficient than the normal AODV protocol | Limited to only one kind of attack, low jitter values |
GABFO KanikaBawa [36] | Analysis of black hole attack | GA, BFO | Black hole attack effects are detected | Does not work with AODV protocols |
NSABO Jaisankar et al. [37] | Finding a safe path between receiver and sender | Proposed framework with the NS-2 simulator | High packet delivery with less packet loss | Limited to two attacks |
SAODV Dhende et al. [38] | Black, gray hole attack removal | SAODV, NS-2 | Detection and prevention of malicious and selfish nodes | Works with only one protocol |
TBBTD Yasin and Abu Zant [39] | Detection and isolation of black hole node | Timer-based baited technique | Throughput, PDR, and end-to-end delay are obtained | Throughput, PDR, and end-to-end delay need to be enhanced |
|