{"id":"https://openalex.org/W2587202460","doi":"https://doi.org/10.1145/3022227.3022228","title":"Performance analysis of black hole attack in MANET","display_name":"Performance analysis of black hole attack in MANET","publication_year":2017,"publication_date":"2017-01-05","ids":{"openalex":"https://openalex.org/W2587202460","doi":"https://doi.org/10.1145/3022227.3022228","mag":"2587202460"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3022227.3022228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004656988","display_name":"Ayanwuyi T. Kolade","orcid":null},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ayanwuyi T. Kolade","raw_affiliation_strings":["Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Kuala Lumpur, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066440569","display_name":"Megat F. Zuhairi","orcid":"https://orcid.org/0000-0003-4418-8562"},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Megat F. Zuhairi","raw_affiliation_strings":["Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Kuala Lumpur, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064414530","display_name":"Eiad Yafi","orcid":"https://orcid.org/0000-0002-3144-0784"},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Eiad Yafi","raw_affiliation_strings":["Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Kuala Lumpur, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101850359","display_name":"Chenyu Zheng","orcid":"https://orcid.org/0000-0002-4213-9081"},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"C. L. Zheng","raw_affiliation_strings":["Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Kuala Lumpur, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.747,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.803702,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":82,"max":83},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.54576993},{"id":"https://openalex.org/keywords/distance-vector-routing-protocol","display_name":"Distance-vector routing protocol","score":0.49197933}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8353284},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7506279},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.64124095},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5835719},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.5806486},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.57767683},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.54576993},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5026994},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4921469},{"id":"https://openalex.org/C202385902","wikidata":"https://www.wikidata.org/wiki/Q1229441","display_name":"Distance-vector routing protocol","level":5,"score":0.49197933},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42947984},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.42250323},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.39074236},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3502154},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1578699},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09384453},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3022227.3022228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1525180324","https://openalex.org/W1535334933","https://openalex.org/W1535744026","https://openalex.org/W1979683980","https://openalex.org/W1993138332","https://openalex.org/W2029986518","https://openalex.org/W2117298409","https://openalex.org/W2157283388","https://openalex.org/W2186879185","https://openalex.org/W2291292945","https://openalex.org/W2422431302","https://openalex.org/W3011577275","https://openalex.org/W4239241662","https://openalex.org/W4285719527","https://openalex.org/W5255802"],"related_works":["https://openalex.org/W4308421166","https://openalex.org/W4255375710","https://openalex.org/W3117556357","https://openalex.org/W2796494647","https://openalex.org/W2755048138","https://openalex.org/W2504374050","https://openalex.org/W2327139809","https://openalex.org/W2184497747","https://openalex.org/W2166350391","https://openalex.org/W2060805688"],"abstract_inverted_index":{"The":[0,244,317],"underlying":[1],"element":[2],"that":[3,37],"supports":[4],"the":[5,9,12,19,27,35,44,55,59,74,82,84,88,102,109,135,154,178,196,225,228,236,240,251,254,260,283,289,295,321,333],"device":[6],"communication":[7,100],"in":[8,39,118,132,176,253,327],"MANET":[10,40,85,89,113,119,133],"is":[11,134,164],"wireless":[13],"connection":[14],"capability.":[15],"Each":[16,162],"node":[17,163],"has":[18,114,188],"ability":[20],"to":[21,34,97,116,120,123,159,191,220,249,259,276,288],"communicate":[22],"with":[23,166],"other":[24],"nodes":[25,38,96,117,148,156,182,246,287,326],"via":[26],"creation":[28],"of":[29,54,58,66,76,81,104,112,129,147,170,262,323],"routing":[30,45,77,151,171,203],"path.":[31],"However,":[32,180],"due":[33,258],"fact":[36],"are":[41,48,61,157,218,247,271,306],"autonomous":[42],"and":[43,173,187,213,234,239,273,292,314,337],"paths":[46,60],"created":[47],"only":[49],"based":[50],"on":[51,73,201],"current":[52],"condition":[53],"network,":[56],"some":[57,181],"extremely":[62],"instable.":[63],"In":[64,223,300],"light":[65],"these":[67],"shortcomings,":[68],"many":[69],"research":[70],"works":[71],"emphasizes":[72],"improvement":[75],"path":[78,242],"algorithm.":[79],"Regardless":[80],"application":[83],"can":[86,330],"support,":[87],"possesses":[90],"unique":[91],"characteristics,":[92],"which":[93,194,310],"enables":[94],"mobile":[95],"form":[98],"dynamic":[99],"irrespective":[101],"availability":[103],"a":[105,141,145,167,266,277,328],"fixed":[106],"network.":[107],"However":[108],"inherent":[110],"nature":[111],"led":[115],"be":[121,160,185],"vulnerable":[122],"denied":[124],"services.":[125],"A":[126],"typical":[127],"Denial":[128],"Service":[130],"(DoS)":[131],"Black":[136,197,285,324],"Hole":[137,198,286,325],"attack,":[138],"caused":[139],"by":[140,339],"malicious":[142,155,245],"node,":[143],"or":[144],"set":[146],"advertising":[149],"false":[150,278],"updates.":[152],"Typically,":[153],"difficult":[158],"detected.":[161],"equipped":[165],"particular":[168],"type":[169],"protocol":[172,204],"voluntarily":[174],"participates":[175],"relaying":[177],"packets.":[179],"may":[183],"not":[184],"genuine":[186,268],"been":[189],"tampered":[190],"behave":[192],"maliciously,":[193],"causes":[195],"attack.":[199,222],"Several":[200],"demand":[202],"e.g.":[205],"Ad":[206],"hoc":[207],"On":[208],"Demand":[209],"Distance":[210],"Vector":[211],"(AODV)":[212],"Dynamic":[214],"Source":[215],"Routing":[216],"(DSR)":[217],"susceptible":[219],"such":[221],"principle,":[224],"attack":[226],"exploits":[227],"Route":[229],"Request":[230],"(RREQ)":[231],"discovery":[232,256],"operation":[233],"falsifies":[235],"sequence":[237],"number":[238],"shortest":[241],"information.":[243],"able":[248],"utilize":[250],"loophole":[252],"RREQ":[255,269],"process":[257],"absence":[261],"validation":[263],"process.":[264],"As":[265],"result,":[267],"packets":[270],"exploited":[272],"erroneously":[274],"relayed":[275],"node(s).":[279],"This":[280],"paper":[281],"highlights":[282],"effect":[284],"network":[290,329],"performance":[291],"therefore":[293],"substantiates":[294],"previous":[296],"work":[297],"done":[298],"[1].":[299],"this":[301],"paper,":[302],"several":[303],"simulation":[304,318],"experiments":[305],"iterated":[307],"using":[308],"NS-2,":[309],"employed":[311],"various":[312],"scenarios":[313],"traffic":[315],"loads.":[316],"results":[319],"show":[320],"presence":[322],"substantially":[331],"affects":[332],"packet":[334],"delivery":[335],"ratio":[336],"throughput":[338],"as":[340,342],"much":[341],"100%.":[343]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2587202460","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-01-18T06:22:08.830482","created_date":"2017-02-17"}