2017
DOI: 10.1007/s10586-017-0927-z
|View full text |Cite
|
Sign up to set email alerts
|

Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…Perhaps this method performs attack detection; this method is not able to secure transmitted data. Blackhole attack, Grayhole attack and flooding attack were mitigated jointly by multi-level trust computation scheme [17]. Here Elliptic Curve Cryptography was used and the security was categorized into three levels.…”
Section: Survey On Attack Detection Methodsmentioning
confidence: 99%
“…Perhaps this method performs attack detection; this method is not able to secure transmitted data. Blackhole attack, Grayhole attack and flooding attack were mitigated jointly by multi-level trust computation scheme [17]. Here Elliptic Curve Cryptography was used and the security was categorized into three levels.…”
Section: Survey On Attack Detection Methodsmentioning
confidence: 99%
“…The route overhead is extended regardless (P.Venkata Krishna et al,2012). An elliptic curve cryptography system for trust management to detect muggers.This approach removes malicious nodes from the network to achieve a greater packet delivery ratio, minimal delay, lowest packet loss, throughput, and successful end-toend delivery with elevated protection in mobile ad hoc network MANET, but it cannot identify when more attackers are possible (Opinder Singh et al,2017).…”
Section: Background and Related Workmentioning
confidence: 99%
“…The trust table ensures the effectiveness of the preceding multi-path communication intrusion detection in MANET. The next section deals with the formulation of the various trust models given as (Opinder Singh et al,2017).…”
Section: Build a Trust Table For The Nodes Of Manetmentioning
confidence: 99%
“…This drawback is catered by using multicast approach for route reply in our proposal. Opinder et al in [11], proposed that for each node with public and private key used for encrypting and decrypting transmitted data with ECC. Dhiraj et al in [12] has proposed a detection and mitigation approach against Black-hole attacks using DYMO routing protocol.…”
Section: Literature Surveymentioning
confidence: 99%