Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) 2020
DOI: 10.1109/icaccs48705.2020.9074282
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Naveena et al [15] suggested a trust-based routing scheme for secure routing. Two stages are used in this scheme, where the first type is data retrieval and the second stage is data transfer mechanism.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Naveena et al [15] suggested a trust-based routing scheme for secure routing. Two stages are used in this scheme, where the first type is data retrieval and the second stage is data transfer mechanism.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This causes complicated nodes when a group of malicious nodes are acted together. To overcome these issues a novel system was introduced which effectively manage the effect of a joint grey-black hole attack [21]. Furthermore, it will be extended using conventional neural network (CNN) to predict the intruder with better accuracy.…”
Section: Black Holementioning
confidence: 99%
“…Several reputation systems have been proposed for peer-to-peer networks [6,7], ad hoc networks [8][9][10], wireless sensor networks [11,12] and Internet of Vehicle [13][14][15]. However, these systems cannot be applied to VANETs in their existing forms they do not consider the main VANET characteristics: dynamicity and high speed.…”
Section: Related Workmentioning
confidence: 99%
“…Some of them [16,17] were proposed to deal with a specific type of message while others [3,6,19] used decentralized trust systems, relying on interactions with neighbors, which is not practical in the highly dynamic environment of a VANET. Several works [4,10,15,23] tried to cope with a specific type of attack, which can be a limitation whereas several others were designed to handle a specific challenge such as authentication [24], privacy [20,25] or localization [18,22]. Therefore, unlike other solutions, we propose an adaptive trust-based security scheme for message exchange in VANETs based on VGA, our new clustering algorithm designed to handle the dynamicity such networks.…”
Section: Related Workmentioning
confidence: 99%