2018
DOI: 10.1007/978-981-10-6890-4_68
|View full text |Cite
|
Sign up to set email alerts
|

Trust-Based Routing for Mitigating Grayhole Attack in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Detection is achieved by calculating the variance between received recommendations. Ullah et al 95 used a hyperbolic tangent function to limit the trust values within the range −1 and +1. Optimal route is chosen based on trust and threshold value.…”
Section: Classification and Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Detection is achieved by calculating the variance between received recommendations. Ullah et al 95 used a hyperbolic tangent function to limit the trust values within the range −1 and +1. Optimal route is chosen based on trust and threshold value.…”
Section: Classification and Reviewmentioning
confidence: 99%
“…Energy consumption is the main parameter for evaluation of any proposed scheme. Most of the researchers have not considered energy as the performance parameters in trust‐based systems 54–56,95 For the accurate detection of malicious nodes, there is a need to devise mechanism with low false positive and low overheads in terms of computation, communication, and routing 54,57,60,62,69,71,72,90,97,100,101 …”
Section: Open Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…• Each attack advertises fake route during routing discovery [16], [20]. [23], [24] [14]- [17], [25] Ability to Can not Can Can communicate [13], [24] [14], [16] [12], [20], [25] with [25], [27] destination node…”
Section: ) Blackhole Attack 2) Grayhole Attack 3) Wormhole Attack 4)mentioning
confidence: 99%
“…Ad hoc on-demands distances vector (AODV) [14] together with Dynamics Sources Routing (DSR) [15] are the reactive routing protocols, which instantly get started when the nodes needed the data packets to be transmitted, and also lessens the cost of bandwidth. With the node's dynamic nature as well as changes that occur often in the topology, the optimum route selection aimed at communication is a demanding task [16]. Additionally, if the node acts maliciously or selfishly, then that will disturb the complete network.…”
Section: Introductionmentioning
confidence: 99%