2018
DOI: 10.1007/s10586-018-1825-8
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(24 citation statements)
references
References 15 publications
0
24
0
Order By: Relevance
“…From the simulation values provided above, it proves that throughput estimation without considering optimal sensing and robust classification results offers a false result of performance. Evaluating the throughput rate of state‐of‐the‐art methods, [1, 2, 5 16], the throughput is improved in OS‐LNCC method compared to [1, 2, 5 16] as OS‐LNCC method makes sure that a primary channel is sensed by only one SU and not by the MU by effective classification based on the LNCC. With this, the throughput rate using OS‐LNCC method is found to be better by 21% compared to [1], 38% compared to [2], 51% compared to [5] and 68% compared to [16].…”
Section: Methodsmentioning
confidence: 99%
“…From the simulation values provided above, it proves that throughput estimation without considering optimal sensing and robust classification results offers a false result of performance. Evaluating the throughput rate of state‐of‐the‐art methods, [1, 2, 5 16], the throughput is improved in OS‐LNCC method compared to [1, 2, 5 16] as OS‐LNCC method makes sure that a primary channel is sensed by only one SU and not by the MU by effective classification based on the LNCC. With this, the throughput rate using OS‐LNCC method is found to be better by 21% compared to [1], 38% compared to [2], 51% compared to [5] and 68% compared to [16].…”
Section: Methodsmentioning
confidence: 99%
“…Hua [146] Covert in-band channel creation. Bhosale and Sonavane [41] Intrusion detection system Jagadeesan and Parthasarathy [147] Cross-layer verification framework.…”
Section: Defenses Against Routing- Black Hole- Gray Hole- and Worm Ho...mentioning
confidence: 99%
“…Bhosale and Sonavane [41] designed and implemented an intrusion detection system to detect wormhole attacks using Contiki OS and Cooja Simulator. Jagadeesan and Parthasarathy [147] proposed a crosslayer verification framework that can detect and counter black hole and worm hole attacks in wireless ad-hoc networks.…”
Section: Defenses Against Routing- Black Hole- Gray Hole- and Worm Ho...mentioning
confidence: 99%
“…Therefore, designing an appropriate security measure in these networks seems essential. [1][2][3][4][5] In general, the operations in mobile networks can be categorized into key management, secure routing, authentication, denial of service attack prevention, and misbehavior and intrusion detection. Various routing protocols are used in MANETs.…”
Section: Introductionmentioning
confidence: 99%