2020
DOI: 10.2174/2210327909666190208154847
|View full text |Cite
|
Sign up to set email alerts
|

DRI Table Based Traffic-Behaviour Analysis Approach for Detection of Blackhole Attack

Abstract: Background: The blackhole infection can affect the collaborative communication in mobile networks. It is man-in-middle attack that seizes and deflects the route and avoids packet-forwarding in the network. The occurrence of collaborative-blackhole reduces the trust and trustworthiness over the network. Objective: A probabilistic and weighted analysis based protocol is proposed in this research for detection of cooperative blackhole nodes and generating the preventing route over the network. The aim of the wo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The communication is performed in extreme conditions including congestion density 0 to 10%, and varied attack types (blackhole, grayhole, and DDOS). After setting up the scenario, the communication is performed using AODV, SAODV, PSAODV, 39 PDS‐AODV, 40 NCV‐AODV, 17 iNCV‐AODV, 17 DFMCRP, 4 FBSSR, 21 Tripathy et al, 6 MBDP‐AODV, AGHA, Singh et al, and mZ‐ETAODV protocols. Probabilistic‐secure AODV (PSAODV) 39 used Data Routing Information (DRI) table‐based probabilistic evaluation on various node‐level features for locating the attackers.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The communication is performed in extreme conditions including congestion density 0 to 10%, and varied attack types (blackhole, grayhole, and DDOS). After setting up the scenario, the communication is performed using AODV, SAODV, PSAODV, 39 PDS‐AODV, 40 NCV‐AODV, 17 iNCV‐AODV, 17 DFMCRP, 4 FBSSR, 21 Tripathy et al, 6 MBDP‐AODV, AGHA, Singh et al, and mZ‐ETAODV protocols. Probabilistic‐secure AODV (PSAODV) 39 used Data Routing Information (DRI) table‐based probabilistic evaluation on various node‐level features for locating the attackers.…”
Section: Resultsmentioning
confidence: 99%
“…After setting up the scenario, the communication is performed using AODV, SAODV, PSAODV, 39 PDS‐AODV, 40 NCV‐AODV, 17 iNCV‐AODV, 17 DFMCRP, 4 FBSSR, 21 Tripathy et al, 6 MBDP‐AODV, AGHA, Singh et al, and mZ‐ETAODV protocols. Probabilistic‐secure AODV (PSAODV) 39 used Data Routing Information (DRI) table‐based probabilistic evaluation on various node‐level features for locating the attackers. The author used the participation and communication‐based features to estimate the reliability of nodes.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations