2017
DOI: 10.1016/j.future.2016.07.010
|View full text |Cite
|
Sign up to set email alerts
|

A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(20 citation statements)
references
References 25 publications
0
20
0
Order By: Relevance
“…A. Mehmood, A. Khanan, A. H. H. Mohamed, S. Mahfooz [12] this paper indentifiesand illustrates the routingconcept by employing awareness of the current traffic flow and other factors such as speed difference, direction, connectivity level and node distance from its neighbours by using the intelligent technique. F. A. Khan, M. Imran, H. Abbas, and M. H. Durad [13] ,this paper uses special nodes called DPS nodes, the work of these nodes is to repeatedly monitor the activity of other nodes attached in a network. When a DPS node identifies a node with faulty behaviour, it declares that suspicious node as a wormhole node by sending message to remaining nodes in the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A. Mehmood, A. Khanan, A. H. H. Mohamed, S. Mahfooz [12] this paper indentifiesand illustrates the routingconcept by employing awareness of the current traffic flow and other factors such as speed difference, direction, connectivity level and node distance from its neighbours by using the intelligent technique. F. A. Khan, M. Imran, H. Abbas, and M. H. Durad [13] ,this paper uses special nodes called DPS nodes, the work of these nodes is to repeatedly monitor the activity of other nodes attached in a network. When a DPS node identifies a node with faulty behaviour, it declares that suspicious node as a wormhole node by sending message to remaining nodes in the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The trust supervision scheme supervise the node identification and the identification of its participating network [9,12,23]. As mentioned above, node activity is the key to evaluating node trust.…”
Section: Node Activity Based Trust and Reputation Estimationmentioning
confidence: 99%
“…The wormhole attacks can be carried out by the inner nodes (traded off nodes inside the system that process packages simply like typical nodes) or outside nodes (who just send packages and do not practice the cryptographic) [9], of which the inner aggressors are progressively risky and hard to recognize [10]. The incredible works of writing give over the top consideration to the outer wormholes however disregard interior wormholes that are additionally usual in MANETs.…”
Section: Eai Endorsed Transactions On Mobile Communications and Applimentioning
confidence: 99%