2015
DOI: 10.1007/s11276-015-0945-9
|View full text |Cite
|
Sign up to set email alerts
|

A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 41 publications
(18 citation statements)
references
References 32 publications
0
18
0
Order By: Relevance
“…In IDS, several approaches are proposed such as packet payload analysis [23], pattern propagation [24] and bro language [25]. In addition, various schemes for ad-hoc networks are proposed to detect attack patterns and to provide a defense mechanism in the network [26][27][28][29][30]. IDS which are passive by nature have a key issue their inability to mount targeted, reliable and adaptive response [31].…”
Section: Intrusion Detection and Preventionmentioning
confidence: 99%
“…In IDS, several approaches are proposed such as packet payload analysis [23], pattern propagation [24] and bro language [25]. In addition, various schemes for ad-hoc networks are proposed to detect attack patterns and to provide a defense mechanism in the network [26][27][28][29][30]. IDS which are passive by nature have a key issue their inability to mount targeted, reliable and adaptive response [31].…”
Section: Intrusion Detection and Preventionmentioning
confidence: 99%
“…Jhaveri et al proposed an approach which is based on the fabricated highest sequence number by a malicious node in order to detect the attacker node [33]. The sequence number based bait detection scheme (SNBDS) includes two slight modification in the routing table of all nodes, i.e., "Node Status" which is used to record the behavior of the node and "Last Reply time" that is the updated sequence number for the desired destination node in the last RREP of any node.…”
Section: Related Workmentioning
confidence: 99%
“…In this adversary model (a type of gray-hole attack described as Attack1 in [22]), a malicious node continuously monitors the field value of received as well as overheard control packets, in order to keep track of the highest recorded value of the destination sequence number. During the routing process, the malicious node replies to an Route Request (RREQ) with the lowest hop count (which is 1) and the highest possible value of the destination sequence number.…”
Section: The Adversary Modelmentioning
confidence: 99%