2014
DOI: 10.5121/ijnsa.2014.6506
|View full text |Cite
|
Sign up to set email alerts
|

Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Malicious node/s also drops packets in network. To detect them various techniques are used: they are Watchdog, PathRater, Side Channel Monitoring (SCM), Monitoring Agent, Sequence Number Model and Two Ack on various parameters [6]. Nodes in network sometimes deliberately drops packet of other legitimate nodes; to encourage them Attack-Resilient Cooperation Stimulation (ARCS) system is applied to achieve fairness among the nodes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Malicious node/s also drops packets in network. To detect them various techniques are used: they are Watchdog, PathRater, Side Channel Monitoring (SCM), Monitoring Agent, Sequence Number Model and Two Ack on various parameters [6]. Nodes in network sometimes deliberately drops packet of other legitimate nodes; to encourage them Attack-Resilient Cooperation Stimulation (ARCS) system is applied to achieve fairness among the nodes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Kennedy Edemacu et al [2] propose several techniques to deal with the packet drop attack: (i)Watch Dog Technique: In this technique, every node acts as a watchdog agent monitoring packet transmissions to neighboring nodes..…”
Section: Packet Dropping Attack Detection Techniquesmentioning
confidence: 99%
“…A PN can recognize when a packet has not been forwarded by an intermediate node, in accordance with the routing time. When the timer of a packet expires and the outgoing packet has not been matched, the observed packet is considered a dropped packet [7]. Packets might be dropped, for example, due to mobility or bad channel, buffer overflow, and, as a result, the node could be considered a cheater.…”
Section: Examples Of Common Attacksmentioning
confidence: 99%