Results 291 to 300 of about 238,447 (346)
Some of the next articles are maybe not open access.
Anomaly based detection of Black Hole Attack on leach protocol in WSN
2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016Vishali Bansal, K. Saluja
semanticscholar +1 more source
Black Hole Attack Detection in Wireless Sensor Networks
WSN has come as a useful technology and has proved to be a motivational force for new technology that is Internet of Things (IoT). Due to its characteristics limitations, security is one of key challenge for the performance of Wireless sensor networks.Mandeep Kumar, Jahid Ali
openaire +1 more source
Secure routing to avoid black hole affected routes in MANET
Symposium on Colossal Data Analysis and Networking, 2016Sagar R. Deshmukh, P. Chatur
semanticscholar +1 more source
Performance Evaluation of Black Hole Attack Under AODV in Smart Metering Network
International ICST Conference on Communications and Networking in China, 2016Yanxiao Zhao +3 more
semanticscholar +1 more source
Node-to-node authentication protocol to prevent black hole attack in AODV
2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016M. Usha, A. Poornima
semanticscholar +1 more source
9th International Conference on Communications and Networking in China, 2014
R. Cai, P. Chong, C. Aung
semanticscholar +1 more source
R. Cai, P. Chong, C. Aung
semanticscholar +1 more source
GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETs
2013 27th International Conference on Advanced Information Networking and Applications Workshops, 2013S. K. Dhurandher +3 more
semanticscholar +1 more source
Removal of black hole attack in AODV routing protocol of MANET
International Conference on Computing Communication and Networking Technologies, 2013K. S. Chavda, Ashish V. Nimavat
semanticscholar +1 more source
Technique for detection of cooperative black hole attack in MANET
International Conference on Computing Communication and Networking Technologies, 2013G. Wahane, Savita Lonare
semanticscholar +1 more source

