Radio and Wireless Conference, 2003. RAWCON '03. Proceedings
DOI: 10.1109/rawcon.2003.1227896
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative security architecture for black hole attack prevention in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(42 citation statements)
references
References 6 publications
0
42
0
Order By: Relevance
“…Whenever a node's failure counter exceeds a predefined threshold, the watchdog node reports it as misbehaving. The watchdog technique [13], [14] has advantages and weaknesses. The watchdog has the advantage that it can detect misbehavior at the forwarding level and not just link level.…”
Section: Basic Watchdog Idsmentioning
confidence: 99%
“…Whenever a node's failure counter exceeds a predefined threshold, the watchdog node reports it as misbehaving. The watchdog technique [13], [14] has advantages and weaknesses. The watchdog has the advantage that it can detect misbehavior at the forwarding level and not just link level.…”
Section: Basic Watchdog Idsmentioning
confidence: 99%
“…This preserves authentication security principle. Another example can be a watchdog node [7] which monitors all the nodes for availability. This node checks the packet forwarding from source node to intermediate node and then to destination node.…”
Section: Security Through Ttp (Trusted Third Party)-mentioning
confidence: 99%
“…Patcha et al [12] have proposed a collaborative architecture for black hole prevention as an extension to the watchdog method.…”
Section: Related Workmentioning
confidence: 99%