2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2016
DOI: 10.1109/icrito.2016.7784989
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of routing protocols under different types of attacks in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…The limitation of this system is that it feeds a false request to the network, which can prompt clogging in the organization. In [19], the suggested framework relies upon an uncommon kind of nodes called monitor nodes, which help distinguish dark opening nodes in the organization. Gatekeeper nodes check the behavior of nodes in the organization.…”
Section: Related Workmentioning
confidence: 99%
“…The limitation of this system is that it feeds a false request to the network, which can prompt clogging in the organization. In [19], the suggested framework relies upon an uncommon kind of nodes called monitor nodes, which help distinguish dark opening nodes in the organization. Gatekeeper nodes check the behavior of nodes in the organization.…”
Section: Related Workmentioning
confidence: 99%
“…3.2 End-to-End delay: It refers to the average time taken by data packets in successfully transmitting messages across the network from source to destination [9]. It includes different types of delays, like queuing at interface queue; retransmission delays; and buffering during the time of route discovery process.…”
Section: Performance Metricsmentioning
confidence: 99%
“…After receiving a RREP source node starts to send packets to the destination node. In [6], the performance of the reactive routing protocol under different types of attacks has been studied. They found that the performance decreases upon attacks especially the black-hole attack in terms of Packet Delivery Ratio (PDR) and Throughput.…”
Section: Aodvmentioning
confidence: 99%