2014 Applications and Innovations in Mobile Computing (AIMoC) 2014
DOI: 10.1109/aimoc.2014.6785535
|View full text |Cite
|
Sign up to set email alerts
|

Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(22 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…This trust of a node forms the basis of resolution of the most secure route for transmission. The simulation outcome exhibit that our answer provides good performance in terms of throughput, relaxed routing, and efficient resource utilization [17].…”
Section: Literature Surveymentioning
confidence: 86%
“…This trust of a node forms the basis of resolution of the most secure route for transmission. The simulation outcome exhibit that our answer provides good performance in terms of throughput, relaxed routing, and efficient resource utilization [17].…”
Section: Literature Surveymentioning
confidence: 86%
“…On the basis of the selected random numbers, a secure channel is established. [12] VI. SIMULATION ENVIRONMENT…”
Section: Methodsmentioning
confidence: 99%
“…If the RREP packet is coming from a node whose next hop is in BH list then it is detected that those two nodes are working in co-operation and hence source of that RREP is included in CBH (Co-operative Blackhole) list. This work is compared with fidelity [25], trust based approach [26][27] and DRI [28] on the basis of routing and computational overheads. This scheme provides a very little amount of computation and routing overhead for detection of attacks.…”
Section: D-cbhmentioning
confidence: 99%