2018
DOI: 10.1002/dac.3518
|View full text |Cite
|
Sign up to set email alerts
|

Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks

Abstract: SummaryToday's communication world is majorly driven by mobile nodes that demand wireless systems for their data relay. One such network is mobile ad hoc network, which is a purely wireless network with which communication is feasible instantly without any aid of preexisting infrastructure; due to this magnificent feature, it has a wide variety of applications. Mobile ad hoc network hinges on cooperative nature of the mobile nodes for relaying data. But at the same time, nodes relaying data for others may comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Sandhya Venu and Avula [12] introduced a Secure Objective Reputation Based Incentive (SORI) framework which controls the malicious signals. Their technique comprised of neighbors checking the neighbor signals for their signal sending conduct and a neighbor signal list comprising of complexity of all the neighbor signals are being kept up by every signal in the framework.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Sandhya Venu and Avula [12] introduced a Secure Objective Reputation Based Incentive (SORI) framework which controls the malicious signals. Their technique comprised of neighbors checking the neighbor signals for their signal sending conduct and a neighbor signal list comprising of complexity of all the neighbor signals are being kept up by every signal in the framework.…”
Section: Literature Surveymentioning
confidence: 99%
“…The Ad-Hoc Network is a transient, wirelessly connected network with no fixed infrastructure made of nodes [11]. Network security plays a key role here and is no longer effective and sufficient in traditional approach to ensure network protection through firewalls and encrypted software [12]. Sensitive information can be shared in the ad hoc networks, so care need to be taken to provide security to the data from attackers or malicious signals that degrade the performance levels [13].…”
Section: Introductionmentioning
confidence: 99%
“…Because of the free or movable nature of the nodes in the network, it is feasible for a variety of assaults to be carried out, including the blackhole attack [10], the greyhole attack [11], and the selective packet drop attack [12]. Attacks known as black holes and attacks that discard some packets [13] are related types of attacks in which just some of the data packets in a transmission are lost. Because black hole nodes act normally throughout the route finding phase, they are not immediately noticeable as mallicious nodes [14].…”
Section: Introductionmentioning
confidence: 99%