Security for Multihop Wireless Networks 2014
DOI: 10.1201/b16754-18
|View full text |Cite
|
Sign up to set email alerts
|

Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…As established above, the estimation of the malicious dropper nature of a node involves (5)- (8). The network features that appear in these equations are RTS SENT , CTS RECV , DATA RECV and DATA FWD .…”
Section: Enhanced Windowing For Collecting Featuresmentioning
confidence: 98%
See 1 more Smart Citation
“…As established above, the estimation of the malicious dropper nature of a node involves (5)- (8). The network features that appear in these equations are RTS SENT , CTS RECV , DATA RECV and DATA FWD .…”
Section: Enhanced Windowing For Collecting Featuresmentioning
confidence: 98%
“…A wide variety of solutions that handle packet dropping attacks in MANETS can be found in recent research [7,8]. Below, we discuss and classify them in three categories according to their basic operation, ACK-, reputation-and detection-based schemes.…”
Section: Related Workmentioning
confidence: 99%
“…It is same as black hole attack but the difference is that the black hole attacker node drops all the data packets, but jelly fish attacker node produces delay during forwarding packets. Jelly fish attack is kind of denial of service attacks, and it is passive attack [20].…”
Section: Jelly Fish Attackmentioning
confidence: 99%