{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:42Z","timestamp":1750220862482,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377049.3377119","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T20:40:32Z","timestamp":1584736832000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Performance Analysis of AODV, OLSR, DSDV Routing Protocols in MANET Under Black Hole Attack"],"prefix":"10.1145","author":[{"given":"Md. Navid Bin","family":"Anwar","sequence":"first","affiliation":[{"name":"Department of Computer Science, American International University - Bangladesh, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"GeeksforGeeks\" GeeksforGeeks 2019. [Online]. Available: https:\/\/www.geeksforgeeks.org\/manet-mobile-ad-hoc-network\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Best effort QoS support routing in mobile ad hoc networks","author":"H.","year":"2012","unstructured":"Luo, H. (2012). Best effort QoS support routing in mobile ad hoc networks. The University of Edinburgh, p.19."},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Computational Modeling and Security (CMS 2016)","author":"Praveen K S","year":"2016","unstructured":"Praveen K S, Gururaj H L, and Ramesh B, \"Comparative Analysis of Black Hole Attack in Ad Hoc Network Using AODV and OLSR Protocols,\" International Conference on Computational Modeling and Security (CMS 2016), 2016."},{"key":"e_1_3_2_1_4_1","unstructured":"Oussama Sbai Mohamed Elboukhari \"Simulation of MANETs single and multiple black hole attack with NS-3\" 978-1-5386-4385-3\/18\/$31.00 \u00a92018 IEEE."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400875184"},{"issue":"1","key":"e_1_3_2_1_6_1","article-title":"Effects of Black Hole Attack on MANET Using Reactive and Proactive Protocols","volume":"10","author":"Ullah Irshad","year":"2013","unstructured":"Irshad Ullah and Shahzad Anwar, \"Effects of Black Hole Attack on MANET Using Reactive and Proactive Protocols,\" IJCSI Int. J. Comput. Sci. Issues, vol. 10, no. 1, May 2013.","journal-title":"IJCSI Int. J. Comput. Sci. Issues"},{"key":"e_1_3_2_1_7_1","volume-title":"Inf. Sci.","author":"Tseng Fan-Hsun","year":"2011","unstructured":"Fan-Hsun Tseng, Li-Der Chou, and Han-Chieh Chao, \"A survey of black hole attacks in wireless mobile ad hoc networks,\" Tseng Al Hum.-Centric Comput. Inf. Sci., 2011."},{"key":"e_1_3_2_1_8_1","first-page":"8887","article-title":"AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack","volume":"0975","author":"Sanjay Singh D. C.","year":"2017","unstructured":"D. C. Sanjay Singh, \"AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack,\" Int. J. Comput. Appl. 0975 -- 8887, vol. 172, no. 9, Aug. 2017.","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_3_2_1_9_1","volume-title":"7th International Conference on Communication, Computing and Virtualization","author":"Chavana A. A.","year":"2016","unstructured":"A. A. Chavana, Prof. D. S. Kuruleb, Prof. P. U. Derec, \"Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack,\" 7th International Conference on Communication, Computing and Virtualization 2016."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Abdellah Nabou My Driss Laanaoui Mohammed Ouzzif \"Evaluation of MANET Routing Protocols under Black Hole Attack Using AODV and OLSR in NS3\" 978-1-5386-7330-0\/18\/$31.00 \u00a92018 IEEE","DOI":"10.1109\/WINCOM.2018.8629603"},{"issue":"4","key":"e_1_3_2_1_11_1","first-page":"2014","article-title":"Performance Analysis of DSDV, AODV and ZRP under Blackhole attack","volume":"3","author":"Arora Neeraj","unstructured":"Neeraj Arora, Dr. N. C. Barwar, \"Performance Analysis of DSDV, AODV and ZRP under Blackhole attack,\" International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 3 Issue 4, April-2014.","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.240"},{"key":"e_1_3_2_1_13_1","unstructured":"https:\/\/www.linuxjournal.com\/article\/5929"},{"key":"e_1_3_2_1_14_1","first-page":"234","article-title":"Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers","author":"Perkins C. E.","year":"1994","unstructured":"C. E. Perkins and P. Bhagwat, \"Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,\" Comp. Com- mun. Rev., Oct. 1994, pp. 234--44.","journal-title":"Rev."}],"event":{"name":"ICCA 2020: International Conference on Computing Advancements","acronym":"ICCA 2020","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377119","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377049.3377119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:38Z","timestamp":1750202618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":14,"alternative-id":["10.1145\/3377049.3377119","10.1145\/3377049"],"URL":"https:\/\/doi.org\/10.1145\/3377049.3377119","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-03-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}