Have a personal or library account? Click to login
Collaborative Multi-Hop Cyclic Redundancy Check and Reputation Approach Against Black Hole Attacks to Enhance Security in Mobile Adhoc Networks Cover

Collaborative Multi-Hop Cyclic Redundancy Check and Reputation Approach Against Black Hole Attacks to Enhance Security in Mobile Adhoc Networks

Open Access
|Feb 2026

References

  1. Alshammari, M. R., Elleithy, K. M. (2018) Efficient and secure key distribution protocol for wireless sensor networks. Sensors, 18(10), 3569. DOI:10.3390/s18103569.
  2. Buchegger, S., Tissieres, C. and Le Boudec, J. Y. (2004) A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? In: Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications, Windermere, December 2004. IEEE, 102-111. DOI: 10.1109/MCSA.2004.5.
  3. Deng, H., Li, W. and Agrawal, D.P. (2002) Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10), 70-75. DOI: 10.1109/MCOM.2002.1039859.
  4. Dinesh, K., A., Singh, J. (2015) Security attacks in mobile Adhoc networks (MANET): A literature survey. International Journal of Computer Applications, 122(20), 31-35. DOI: 10.5120/21818-5148.
  5. Djenouri, D., Khelladi, L. and Badache, A.N. (2005) A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys & Tutorials, 7(4), 2-28. DOI: 10.1109/COMST.2005.1593277.
  6. Heydari, V., Yoo, S.M. (2016) E2EACK: An end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs. Wireless Netw, 22, 2259–2273. DOI: 10.1007/s11276-015-1098-6.
  7. Hikal, N.A., Shams, M.Y., Salem, H., Eid, M.M. (2021) Detection of black-hole attacks in MANET using adaboost support vector machine. Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 41(1), 669-682. DOI:10.3233/JIFS-202471.
  8. Hu, Y.C., Perrig, A. and Johnson, D.B. (2005) Ariadne: A secure on-demand routing protocol for Ad Hoc networks. Wireless Netw, 11, 21–38 (2005). DOI:10.1007/s11276-004-4744-y.
  9. Jebrane, J., Chhaybi, A., Lazaar, S., and Nitaj, A. (2025) Elliptic curve cryptography with machine learning. Cryptography, 9(1), 3. DOI:10.3390/cryptography9010003.
  10. Khan, N. R., Ahmad, G. F., Barskar, R., and Shukla, P. K. (2025) Mobile Adhoc networks: Protocols and its challenges. IETE Journal of Research, 1–31. DOI:10.1080/03772063.2025.2549521.
  11. Kumar, V. and Kumar, R. (2015) An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Computer Science, 48, 472–479. DOI: 10.1016/j.procs.2015.04.122.
  12. Mohammad, S.N., Singh, R.P., Dey, A., Ahmad, S.J. (2019) ESMBCRT: Enhance security to MANETs against black hole attack using MCR technique. In: Saini, H., Singh, R., Patel, V., Santhi, K., Ranganayakulu, S. (eds) Innovations in Electronics and Communication Engineering. Lecture Notes in Networks and Systems, vol. 33. Springer, Singapore. DOI:10.1007/978-981-10-8204-7_32.
  13. Muzammal, S. M., Murugesan, R. K., Jhanjhi, N. Z., Humayun, M., Ibrahim, A. O., and Abdelmaboud, A. (2022) A trust-based model for secure routing against RPL Attacks in internet of things. Sensors, 22(18), 7052. DOI:10.3390/s22187052.
  14. Narayana, M. V., Kumar, V. P., Nanda, A. K., Rao, H., and Chavva, S. R. (2023) Enhanced energy efficient with a trust aware in MANET for real-time applications. Computers, Materials and Continua, 75(1), 587–607. DOI:10.32604/cmc.2023.034773.
  15. Perkins, C. E. and Belding-Royer, E. M. (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd Workshop on Mobile Computing Systems and Applications (WMCSA ’ 99), New Orleans, February 1999. IEEE, pp. 90-100. DOI:10.1109/MCSA.1999.749281.
  16. Sun, H.-M., Chen, C.-H. and Ku, Y.-F. (2012) A novel acknowledgment-based approach against collude attacks in MANET. Expert Systems with Applications, 39(9), 7968–7975. DOI:10.1016/j.eswa.2012.01.118.
  17. Vatambeti, R., Mantena, S. V., Kiran, K. V. D., Chennupalli, S., and Gopalachari, M. V. (2024) Black hole attack detection using Dolphin echo-location-based machine learning model in MANET environment. Computers and Electrical Engineering, 114, 109094. DOI:10.1016/j.compeleceng.2024.109094.
  18. Yadav, P. and Hussain, M. (2017) A secure AODV routing protocol with node authentication. In: Proceedings of 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, April 2017. IEEE, 489-493, DOI: 10.1109/ICECA.2017.8203733.
DOI: https://doi.org/10.2478/ttj-2026-0005 | Journal eISSN: 1407-6179 | Journal ISSN: 1407-6160
Language: English
Page range: 48 - 62
Published on: Feb 21, 2026
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2026 Shaik Mazhar Hussain, Imran Mohd Ibrahim, Md Masood Ahmad, Md. Ejaz Ahamed, published by Transport and Telecommunication Institute
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.