2021
DOI: 10.1002/spy2.183
|View full text |Cite
|
Sign up to set email alerts
|

A reliable and secure method for network‐layer attack discovery and elimination in mobile ad‐hoc networks based on a probabilistic threshold

Abstract: The wireless nature of mobile networks makes it vulnerable to all kinds of attacks. Therefore, designing a secure method for detecting intrusive nodes in this type of network seems necessary. Among the types of attacks on mobile ad-hoc networks, the Grayhole attack is one of the most dangerous attacks. In this type of attack, a malicious node absorbs network traffic and then selectively deletes a number of received packets. In this paper, a method called RSA-GRAY HOLE is used to detect and isolate the Grayhole… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…Develop various cryptographic algorithms and procedures to secure communication across MANET nodes. For example, Intelligent Routing Mechanism [14], Effective Certificateless Secure Communication [15], Energy-Efficient Partial Permutation Encryption (EEPPM) [16], Secure optimized routing Protocol [17,18], Secure technique for network layer attack discovery and elimination [19,20], and Lightweight reputation-based approach [21] protocols. On the other hand, these approaches are vulnerable to various security concerns and require much power from the nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Develop various cryptographic algorithms and procedures to secure communication across MANET nodes. For example, Intelligent Routing Mechanism [14], Effective Certificateless Secure Communication [15], Energy-Efficient Partial Permutation Encryption (EEPPM) [16], Secure optimized routing Protocol [17,18], Secure technique for network layer attack discovery and elimination [19,20], and Lightweight reputation-based approach [21] protocols. On the other hand, these approaches are vulnerable to various security concerns and require much power from the nodes.…”
Section: Related Workmentioning
confidence: 99%
“…A reliable and secure algorithm (RSA) [22] was designed for gray-hole attack detection and prevention according to the probabilistic threshold. Initially, the validity of the nodes of a path was measured to choose a valid path.…”
Section: Literature Surveymentioning
confidence: 99%
“…Mobile Ad hoc Networks (MANETs) are key players in the future of wireless communication [5]. They consist of distributed nodes without any predetermined infrastructure [6]. The lightweight mobile devices have the capabilities of sensing and processing received information [7].…”
Section: Introductionmentioning
confidence: 99%