2017
DOI: 10.1007/s11036-017-0912-z
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 10 publications
1
19
0
Order By: Relevance
“…Arulkumaran and Gnanamurthy [36] present a solution for one of the possible attacks in MANETs that is the black hole attack. In the black hole attack, the malevolent node promotes itself such that it has the entire valid routes to its destinations.…”
Section: Related Workmentioning
confidence: 99%
“…Arulkumaran and Gnanamurthy [36] present a solution for one of the possible attacks in MANETs that is the black hole attack. In the black hole attack, the malevolent node promotes itself such that it has the entire valid routes to its destinations.…”
Section: Related Workmentioning
confidence: 99%
“…In the literature, Fan-Huns Tseng et al [7] addressed the security attacks in WMANET. According to authors [1,2] securing the WMANET uses various methods is making sure mutual confirmation of participations nodes, confidentially and integrity of exchange-data availability of the network resource and access control to the network communication medium.…”
Section: Attacks In Wmanetmentioning
confidence: 99%
“…Further in the literature [2,[14][15][19][20] utilizes promiscuous mode to identify the malicious node and if yes, then broadcast the message that the malicious node is present in the system. Further, the intermediate node sends a PPER packet to the source node, then providing sent RREP packet to take switch on its promiscuous mode and send a "hello" message to the destination node through the intermediate node which is RREP packet is received.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Disadvantages of TLEACH is that it lacks monitoring of cluster head and does not control data loss. Li et al [6] Manage trust in 2 parts, reputation-based framework and trust establishment framework. The former uses direct observation from one hop neighbor and indirect observation from other nodes.…”
mentioning
confidence: 99%