From: A survey of black hole attacks in wireless mobile ad hoc networks
Schemes | Routing protocol | Simulator | Publication year | Results | Defects |
---|---|---|---|---|---|
DRI and cross checking [36] | AODV | No simulator | 2003 | No simulation results | - |
DRI table and cross checking using FREQ and FREP [37] | AODV | - | 2007 | A higher throughput performance almost 50% than AODV | 5-8% more communication overhead of route request |
DCM [38] | AODV | NS-2 | 2007 | The PDR is improved from 64.14 to 92.93%, and the detection rate is higher than 98% | A higher control overhead than AODV |
Hash based [39] Hashed-based | DSR | - | 2009 | No simulation results | - |
MAC and Hash-based PRF Scheme [40] | AODV | NS-2 | 2009 | The PDR is higher than 90% when AODV is inaccessible 50% | The malicious node is able to forge a fake reply to dodge the detection scheme |
BBN and RIP [41] | AODV | - | 2010 | No simulation results | - |
BDSR [43] | DSR | QualNET | 2011 | The PDR of BDSR is always higher than 90% | The overhead is minimal higher than DSR, but lower than WD approach |