2015 1st International Conference on Next Generation Computing Technologies (NGCT) 2015
DOI: 10.1109/ngct.2015.7375131
|View full text |Cite
|
Sign up to set email alerts
|

To mitigate black hole attack in AODV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Raushan Kumar [11] in the year 2015 proposed a mechanism which says that the modification of AODV protocol at source and destination where the secure route discovery verifies the sequence numbers in the route request and route reply and compare the threshold values.…”
Section: Resisting Blackhole Attacks On Manetsmentioning
confidence: 99%
“…Raushan Kumar [11] in the year 2015 proposed a mechanism which says that the modification of AODV protocol at source and destination where the secure route discovery verifies the sequence numbers in the route request and route reply and compare the threshold values.…”
Section: Resisting Blackhole Attacks On Manetsmentioning
confidence: 99%
“…Wireless sensor networks have wide application in fields such as home, industry, environmental observation, military monitoring, and disaster relief [1]. Recent advances in wireless communications and electronics have enabled the development of low-cost sensor nodes that communicate over short distances.…”
Section: Problem Descriptionmentioning
confidence: 99%
“…It has a limited amount of range of the commu-nication and capabilities of power consumptions hence in real time scenario, it can be used in the military during the battle fields, during the disastrous earthquake and recovery from those disasters [1]. MANET"s are wireless networks which make use of the electromagnetic radio waves for the communication.…”
Section: Introductionmentioning
confidence: 99%