Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 715820, 11 pages
Research Article

Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

1Department of CSE, Karpagam College of Engineering, Coimbatore 641032, India
2Department of CSE, Shanmuganathan Engineering College, Pudukkottai District 622507, India
3Department of IT, Nandha Engineering College, Erode 638052, India
4Department of CSE, Sri Ramakrishna Engineering College, Coimbatore 641022, India

Received 9 April 2015; Accepted 18 August 2015

Academic Editor: Venkatesh Jaganathan

Copyright © 2015 M. Rajesh Babu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [6 citations]

The following is the list of published articles that have cited the current article.

  • Fihri Mohammed, El Fatimi Youssef, Hnini Abedehalim, and Ezzati Abdellah, “Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN,” Proceedings of the International Conference on Internet of things and Cloud Computing - ICC '16, pp. 1–4, . View at Publisher · View at Google Scholar
  • Sachin D. Ubarhande, Dharmpal D. Doye, and Prakash S. Nalwade, “A Secure Path Selection Scheme for Mobile Ad Hoc Network,” Wireless Personal Communications, 2017. View at Publisher · View at Google Scholar
  • S. D. Ubarhande, D. D. Doye, and P. S. Nalwade, “A time stamp-based algorithm to improve security and performance of mobile ad hoc network,” Wireless Networks, 2017. View at Publisher · View at Google Scholar
  • Dharmpal D. Doye, Prakash S. Nalwade, and Sachin D. Ubarhande, “Security in wireless ad hoc network,” International Journal of Internet Protocol Technology, vol. 10, no. 2, pp. 126–132, 2017. View at Publisher · View at Google Scholar
  • Jyoti Neeli, and N. K. Cauvery, “Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node,” Cybernetics and Algorithms in Intelligent Systems, vol. 765, pp. 346–355, 2018. View at Publisher · View at Google Scholar
  • Pattabiram Thulasingam Kasthuribai, and Murugaiyan Sundararajan, “Secured and QoS Based Energy-Aware Multipath Routing in MANET,” Wireless Personal Communications, 2018. View at Publisher · View at Google Scholar