2019
DOI: 10.1007/978-981-13-6095-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Maneuvering Black-Hole Attack Using Different Traffic Generators in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…The Authors in [3] have worked on validating the accuracy of the results generated. Author in [4] has worked on multiple traffic generators and has evaluated performance in normal and malicious scenarios, the extension to the work would be to coordinate the attackers. In [5] Rmayti et al accords a scenario of using a coordinated behavior through tunnel for worm hole attack, which is adapted here to check the performance degradation in coordination.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…The Authors in [3] have worked on validating the accuracy of the results generated. Author in [4] has worked on multiple traffic generators and has evaluated performance in normal and malicious scenarios, the extension to the work would be to coordinate the attackers. In [5] Rmayti et al accords a scenario of using a coordinated behavior through tunnel for worm hole attack, which is adapted here to check the performance degradation in coordination.…”
Section: Literature Surveymentioning
confidence: 99%
“…The node further affects the network transmission by retaining or by dropping the data, which results in the drop of packet forwarding rate. In [4] author has selected the height of antenna as ≥3 meter to capture the traffic along with increasing the storage of the buffer size of the node as parameters to inhibit malicious behavior. Figure 6 depicts the results obtained with different classifiers on varying speed of the mobile nodes to analyze the accuracy and it has been found that SVM performs the best in all the considered classifiers.…”
Section: Pdr% =mentioning
confidence: 99%
“…After reaching the RREQ packet to the destination node, the destination regenerates the RREP packet. The regenerated RREP packet along with the FRREP with the highest hop count is sent by the black hole node towards the source node (Taranum and Khan;. As the source node received the packet with the highest hope count then it starts sending data towards the black hole node by believing that it is a destination node (Majumderand Bhattacharyya; 2020).…”
Section: Figure 1 Sending Frrep By Black Hole Nodementioning
confidence: 99%