2013 International Conference on Cloud &Amp; Ubiquitous Computing &Amp; Emerging Technologies 2013
DOI: 10.1109/cube.2013.23
|View full text |Cite
|
Sign up to set email alerts
|

Detecting and Overcoming Blackhole Attack in AODV Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…The data will be sent through that node. Author Dangore M & Sambare S [17] proposed a scheme in which the first receiver of the RREP will start a process to check the honesty of RREP Generator by sending a request to neighbors and based on reply. Node will be judged as genuine or malicious.…”
Section: Protocol Based On Opinion From Nodesmentioning
confidence: 99%
“…The data will be sent through that node. Author Dangore M & Sambare S [17] proposed a scheme in which the first receiver of the RREP will start a process to check the honesty of RREP Generator by sending a request to neighbors and based on reply. Node will be judged as genuine or malicious.…”
Section: Protocol Based On Opinion From Nodesmentioning
confidence: 99%
“…It also has a resource constraint like bandwidth, computing power, battery lifetime and many more. [7]. As there are various functions that take place in the MANET like packet forwarding and others, the security is one of the essential components.…”
Section: Introductionmentioning
confidence: 99%