Research Article

[Retracted] A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)

Table 1

The comparison of existing methods.

AuthorContributionMethodologyAdvantageLimitations

CBHDAP
Vijayakumar and Somasundaram [33]
Sleuthing and circumventing black hole attacks in MANETCBHDAPOptimum results for throughput and detection probabilityDoes not work for security attacks
DSIDS
Talukdar et al. [34]
BHAODV and DBHAODV protocolsIDS and digital signatureQoS, PDR, overhead is detectedWorks well with a limited number of packets and nodes
FIDS
Balan et al. [35]
Black hole node detectionNS-2 simulatorThis approach is efficient than the normal AODV protocolLimited to only one kind of attack, low jitter values
GABFO
KanikaBawa [36]
Analysis of black hole attackGA, BFOBlack hole attack effects are detectedDoes not work with AODV protocols
NSABO
Jaisankar et al. [37]
Finding a safe path between receiver and senderProposed framework with the NS-2 simulatorHigh packet delivery with less packet lossLimited to two attacks
SAODV
Dhende et al. [38]
Black, gray hole attack removalSAODV, NS-2Detection and prevention of malicious and selfish nodesWorks with only one protocol
TBBTD
Yasin and Abu Zant [39]
Detection and isolation of black hole nodeTimer-based baited techniqueThroughput, PDR, and end-to-end delay are obtainedThroughput, PDR, and end-to-end delay need to be enhanced