Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

Article ID

CSTNWS41C3F

Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

Ephantus G. Mwangi
Ephantus G. Mwangi Muranga University of Technology
Geoffrey Muchiri Muketha
Geoffrey Muchiri Muketha
Gabriel Ndung’u Kamau
Gabriel Ndung’u Kamau
DOI

Abstract

The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackhole is a denial of service attack under active attacks. Blackhole nodes work in collaboration forming cooperative black hole attacks. The attacks drop or redirecting data packets on transit. Cooperative blackhole attacks are dangerous in operations where communication is critical

Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackhole is a denial of service attack under active attacks. Blackhole nodes work in collaboration forming cooperative black hole attacks. The attacks drop or redirecting data packets on transit. Cooperative blackhole attacks are dangerous in operations where communication is critical

Ephantus G. Mwangi
Ephantus G. Mwangi Muranga University of Technology
Geoffrey Muchiri Muketha
Geoffrey Muchiri Muketha
Gabriel Ndung’u Kamau
Gabriel Ndung’u Kamau

No Figures found in article.

Ephantus G. Mwangi. 2020. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 20 (GJCST Volume 20 Issue E3): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 20 Issue E3
Pg. 39- 54
Classification
GJCST-E Classification: C.2.0
Keywords
Article Matrices
Total Views: 4113
Total Downloads: 1045
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

Ephantus G. Mwangi
Ephantus G. Mwangi Muranga University of Technology
Geoffrey Muchiri Muketha
Geoffrey Muchiri Muketha
Gabriel Ndung’u Kamau
Gabriel Ndung’u Kamau

Research Journals