2015 31st IEEE International Conference on Data Engineering Workshops 2015
DOI: 10.1109/icdew.2015.7129553
|View full text |Cite
|
Sign up to set email alerts
|

Ant based Defense Mechanism for Selective Forwarding Attack in MANET

Abstract: A selective forwarding attack is one of the most crucial security problems in MANET. Usually such attacker degrades the network performance in terms of packet loss rate, collision, and overhead. Designing MANET that can work reliably even in the presence of inside packet drop attackers is really challenging. In order to overcome these issues, we have proposed an enhanced Ant based Defense Mechanism for Selective Forwarding Attack in MANET. First, we have implemented S-ACK scheme to transmit the secure acknowle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…The algorithm suffers from high routing overhead as each node sends an acknowledgment message to the prior node. In addition to the above problem, Kumari and Paramasivan [ 25 ] developed a routing mechanism of trust where the behavior of nodes is analyzed based on the dropping rate of packets, but this protocol also suffers from high overhead because of the additional use of control packets. Gurung and Chauhan [ 26 ] used the approach of mitigating a Gray Hole Attack (GHA) that takes the help of other nearby nodes, known as the nodes of the Intrusion Detection System (IDS), to monitor the performance of other communicating nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm suffers from high routing overhead as each node sends an acknowledgment message to the prior node. In addition to the above problem, Kumari and Paramasivan [ 25 ] developed a routing mechanism of trust where the behavior of nodes is analyzed based on the dropping rate of packets, but this protocol also suffers from high overhead because of the additional use of control packets. Gurung and Chauhan [ 26 ] used the approach of mitigating a Gray Hole Attack (GHA) that takes the help of other nearby nodes, known as the nodes of the Intrusion Detection System (IDS), to monitor the performance of other communicating nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The concept of SI is increasingly intertwined with algorithms for processing and optimizing the large amount and flows of information. In [ 25 ], a survey on different SI algorithms along with their role in the IoT is presented. The authors stated that SI in a wireless network can be used for Cluster Head (CH) selection, for sensor deployment, node localization, and in IoT to minimize the number of hops from the sensor node to the sink node.…”
Section: Introductionmentioning
confidence: 99%
“…In order to overcome with black hole attack problem, the authors proposed an enhanced Ant-based defense mechanism for selective forwarding attack [34] in MANET. In this mechanism, the trust model is used that defines the trustworthiness of the node based on the number of time the packet is dropped.…”
Section: Trust-based Schemesmentioning
confidence: 99%