2015 International Conference on Signal Processing and Communication Engineering Systems 2015
DOI: 10.1109/spaces.2015.7058198
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Black Hole Attack in AODV using timer-based detection mechanism

Abstract: Mobile ad hoc networks (MANET) are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. MANET do not have centralized administration, here nodes act as both host as well as router and communicate by forwarding packets for each other in multi hop way, because of the fundamental characteristics like, the open medium, dynamic network topology,lack of centralized monitoring and management these networks are particularly vulnerable to various types of attacks. One of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…In our proposed system we use DSR (Dynamic Source Routing) protocol to overcome the delay by finding the optimal path from original source to destination node excluding the malicious node. N. Choudhary [4] introduced a solution that based on sensing the wireless channel. This approach assigns a max trust value and min trust value to all its neighboring nodes.…”
Section: Related Workmentioning
confidence: 99%
“…In our proposed system we use DSR (Dynamic Source Routing) protocol to overcome the delay by finding the optimal path from original source to destination node excluding the malicious node. N. Choudhary [4] introduced a solution that based on sensing the wireless channel. This approach assigns a max trust value and min trust value to all its neighboring nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Nidhi Choudary [12] in the year 2015 proposed a solution to detect the malicious node or attacker by using timer based detection. In this method each node defines a trust value for its neighbor node and inserts a timer with each packet and if the trust value decreases below the threshold value for any node then all the other nodes will put that node in their blacklist.…”
Section: Resisting Blackhole Attacks On Manetsmentioning
confidence: 99%
“…This method is not so efficient in terms of End-to-End delay and energy conservation. Choudhary and Tharani [21] proposed a mechanism in order to prevent black hole attack in AODV based on "Timer Based Detection". Initially, each node in the network defines the max trust value to all its neighbor nodes and determines the min trust value allowable.…”
Section: Related Workmentioning
confidence: 99%