2016 Symposium on Colossal Data Analysis and Networking (CDAN) 2016
DOI: 10.1109/cdan.2016.7570922
|View full text |Cite
|
Sign up to set email alerts
|

A modified approach for recognition and eradication of extenuation of gray-hole attack in MANET using AODV routing protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…• We have proposed a prominent technique for the detection of malicious attacks, such as black hole and gray hole attacks, through the intrusion detection system (IDS) nodes using the connected dominating set (CDS) technique. Our work is different from past research, wherein the approach used was only for black hole attacks [12][13][14] or the proposed scheme worked only for gray hole attacks [15][16][17].…”
Section: Findings and Contributionmentioning
confidence: 80%
“…• We have proposed a prominent technique for the detection of malicious attacks, such as black hole and gray hole attacks, through the intrusion detection system (IDS) nodes using the connected dominating set (CDS) technique. Our work is different from past research, wherein the approach used was only for black hole attacks [12][13][14] or the proposed scheme worked only for gray hole attacks [15][16][17].…”
Section: Findings and Contributionmentioning
confidence: 80%
“…In this way, source device 8 having sinkhole diverts the local data traffic to itself and now it can perform any malicious action. 10,11 In MANETs, the devices have limited energy to establish the links to broadcast the data packets. Malicious devices transmit beacon messages periodically in MANETs, making a huge amount of useless data traffic to increase the routing overhead.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In this way, source device 8 having sinkhole diverts the local data traffic to itself and now it can perform any malicious action. 10,11…”
Section: Background and Related Workmentioning
confidence: 99%
“…Kumar et al proposed a technique to detect the malicious nodes by using IDS nodes in [34]. The main objective of this work was to design a technique to detect the detect black-hole attack and also lessen the effect of malicious node on genuine nodes.…”
Section: Related Workmentioning
confidence: 99%