{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:36:55Z","timestamp":1751416615649,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802930","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T21:21:42Z","timestamp":1483392102000},"page":"62-68","source":"Crossref","is-referenced-by-count":5,"title":["Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols"],"prefix":"10.1109","author":[{"given":"Lineo","family":"Mejaele","sequence":"first","affiliation":[]},{"given":"Elisha","family":"Oketch Ochola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"43","article-title":"An analysis of Security Attacks found in Mobile Ad-hoc Network","volume":"5","author":"singh","year":"2014","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ref11","first-page":"1","author":"li","year":"2008","journal-title":"Security Issues in Mobile Ad Hoc Networks-A Survey"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396947"},{"key":"ref13","first-page":"546","article-title":"The black-hole node attack in MANET","author":"sharma","year":"0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-33112-6_6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.78"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/2192-1962-1-4"},{"key":"ref17","first-page":"211","article-title":"Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad hoc Networks,&#x201D; IJCA Special Issue on &#x201C;Mobile Adhoc Networks","author":"thakare","year":"2010","journal-title":"MANETs"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2011.129"},{"key":"ref19","first-page":"12","article-title":"MANET routing protocols and wormhole attack against AODV","volume":"10","author":"jhaveri","year":"2010","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref4","first-page":"50","article-title":"Survey of wireless MANET application in battlefield operations","volume":"2","author":"rajabhushanam","year":"2011","journal-title":"(IJACSA) International Journal of Advanced Computer Science and Applications"},{"journal-title":"A Survey of Network Simulation Tools Current Status and Future Development","year":"2008","author":"pan","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-33112-6_5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2012.112"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIT.2010.5508531"},{"key":"ref8","first-page":"108","volume":"2","author":"zaiba","year":"2011","journal-title":"Security issues challenges and solution in MANET"},{"key":"ref7","first-page":"1","article-title":"Secure AODV ptotocol to mitigate black hole attack in Mobile Ad hoc Networks","author":"rajesh","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2011.5874910"},{"key":"ref9","first-page":"32","article-title":"Manet: vulnerabilities, challenges, attacks, application","volume":"11","author":"goyal","year":"2011","journal-title":"IJCEM International Journal of Computational Engineering & Management"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77018-3_54"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NUiConE.2011.6153239"},{"key":"ref22","first-page":"2377","article-title":"Removal of black hole attack in ad hoc wireless networks to provide confidentiality security service","volume":"3","author":"vani","year":"2011","journal-title":"Int J Eng Sci"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MICC.2009.5431439"},{"key":"ref24","first-page":"1430","article-title":"Performance Analysis and Minimization of Blackhole Attack in MANET","volume":"2","author":"suryawanshi","year":"2012","journal-title":"IJERA"},{"key":"ref23","first-page":"54","article-title":"Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet","volume":"3","author":"raj","year":"2009","journal-title":"IJCSIS"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.244"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2011.6122811"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","start":{"date-parts":[[2016,8,17]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802930.pdf?arnumber=7802930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:53:40Z","timestamp":1507002820000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802930","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}