2017
DOI: 10.1016/j.comnet.2017.04.027
|View full text |Cite
|
Sign up to set email alerts
|

A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…Vehicular Reactive Protocol, and Stable connected dominating sets (CDS)-Based Routing Protocol are examples of Reactive Routing Protocols. 14,18,21,[27][28][29]…”
Section: Reactive Routing Protocolmentioning
confidence: 99%
“…Vehicular Reactive Protocol, and Stable connected dominating sets (CDS)-Based Routing Protocol are examples of Reactive Routing Protocols. 14,18,21,[27][28][29]…”
Section: Reactive Routing Protocolmentioning
confidence: 99%
“…Certified authority ensures the reliable communication and segregates the malicious nodes. Rmayti et al 60 adopted a decentralized mechanism to detect the smart malicious nodes based on Bernoulli Bayesian model. This method classifies the nodes according to their behavior into three categories, namely, malicious, legitimate, and suspicious.…”
Section: Classification and Reviewmentioning
confidence: 99%
“…Most of the researchers have not considered energy as the performance parameters in trust‐based systems 54–56,95 For the accurate detection of malicious nodes, there is a need to devise mechanism with low false positive and low overheads in terms of computation, communication, and routing 54,57,60,62,69,71,72,90,97,100,101 Most of the solutions provided so far are verified using single scenario only.…”
Section: Open Issuesmentioning
confidence: 99%
“…However, this results in network outcome vitiating, unnecessary resource exploitation, and privacy of the users. Therefore, cooperative routing and attack mitigation systems are designed for encountering such attacks in MANET [5]. Graph-theory-based network partitioning techniques were presented so far for realizing the detection of decentralized recognition in the fast response speed on using the characteristics highlights of power flow in the independency of various groups [6].…”
Section: Introductionmentioning
confidence: 99%