2018
DOI: 10.1007/s10586-018-1958-9
|View full text |Cite
|
Sign up to set email alerts
|

Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…The hop number field in the routing message is a variable part, which is authenticated by a hash chain. Other fields in the routing message are invariant parts, which are authenticated by digital signature [30][31][32][33].…”
Section: Security Aodv Routing Protocolmentioning
confidence: 99%
“…The hop number field in the routing message is a variable part, which is authenticated by a hash chain. Other fields in the routing message are invariant parts, which are authenticated by digital signature [30][31][32][33].…”
Section: Security Aodv Routing Protocolmentioning
confidence: 99%
“…All these security schemes are considered as standard solution; however, all of them are also reported to suffer from significant problems. Irrespective of potential capability of resisting tampered and impersonating messages, SAODV [18] uses public key encryption, thereby imposing overhead. The node using SAODV is not capable of identifying any malicious code and hence such code is also forwarded undetected to receiver node.…”
Section: Problems In Existing Manet Security Solutionmentioning
confidence: 99%
“…So, the homomorphism based approach has been used in the literature to detect the malicious attack. In addition, the distance vector has been used to determine the distance between the nodes and preventing the packet dropping [8]. The security is the other important aspect requires equal concern to enhance the performance.…”
Section: Related Workmentioning
confidence: 99%