2010
DOI: 10.1007/978-3-642-12214-9_81
|View full text |Cite
|
Sign up to set email alerts
|

Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…In [16], DSR routing protocols has been modified to find secure routes between source and destination. Each node maintains with it the trust value of its neighboring nodes.…”
Section: Techniques For Prevention and Detection Of Cooperative Blackmentioning
confidence: 99%
“…In [16], DSR routing protocols has been modified to find secure routes between source and destination. Each node maintains with it the trust value of its neighboring nodes.…”
Section: Techniques For Prevention and Detection Of Cooperative Blackmentioning
confidence: 99%
“…H. In [16], DSR routing protocols has been modified to find secure routes between source and destination. Each node maintains with it the trust value of its neighboring nodes.…”
Section: Ementioning
confidence: 99%
“…For example some mechanism works based on Intrusion Detection Systems (IDS) [4] and some nodes in the network play IDS role which is based on MANET specifications, IDS with dynamic hierarchical structure is a good choice [5]. Some other mechanisms are Trust Based [6][7][8][9], which is based on nodes' history and observation each node earns a trust level that is used for routing and detection. Usually these methods are more vulnerable to grayhole attacks.…”
Section: Introductionmentioning
confidence: 99%