2012 International Conference on Computing Sciences 2012
DOI: 10.1109/iccs.2012.7
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 39 publications
(25 citation statements)
references
References 3 publications
0
24
0
Order By: Relevance
“…This protocol [11] focuses to mitigate black hole attack. It mainly includes promiscus mode through which neighbours trust value is calculated.…”
Section: A Trust Based Approach For Aodv Protocol To Mitigate Black Hmentioning
confidence: 99%
“…This protocol [11] focuses to mitigate black hole attack. It mainly includes promiscus mode through which neighbours trust value is calculated.…”
Section: A Trust Based Approach For Aodv Protocol To Mitigate Black Hmentioning
confidence: 99%
“…These trust values classify the nodes as compromised or trustworthy. The trust based approach explained in [17] presents a collaborative approach in mitigating blackhole attacks in AODV protocol in MANET. It uses the concept of threshold value and the trust values below the threshold value are considered to be malicious.…”
Section: Related Workmentioning
confidence: 99%
“…In [21] proposes that every node keeps a trust value on its neighbors and the trust value is calculated as a ratio of number of packets dropped to the number of packets forwarded. In this method every node listens to its neighbor promiscuously.…”
Section: Trust Based Approachmentioning
confidence: 99%