2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) 2020
DOI: 10.1109/icirca48905.2020.9183256
|View full text |Cite
|
Sign up to set email alerts
|

A Time Interval based Blockchain Model for Detection of Malicious Nodes in MANET Using Network Block Monitoring Node

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…However, after a node is categorized as malicious, the non-malicious behavior of that node is also ignored, lacking the subjectivity and dynamic timeliness of the judgment. Narayana & Midhunchakkaravarthy (2020) (ICIRCA-2020) describes a trust assessment and block analysis-based model for the detection of malicious nodes in mobile ad hoc networks. Malicious nodes in the network are detected by analyzing the blocks generated by each node after transmitting data.…”
Section: Related Workmentioning
confidence: 99%
“…However, after a node is categorized as malicious, the non-malicious behavior of that node is also ignored, lacking the subjectivity and dynamic timeliness of the judgment. Narayana & Midhunchakkaravarthy (2020) (ICIRCA-2020) describes a trust assessment and block analysis-based model for the detection of malicious nodes in mobile ad hoc networks. Malicious nodes in the network are detected by analyzing the blocks generated by each node after transmitting data.…”
Section: Related Workmentioning
confidence: 99%
“…The current mobile nodes highly necessitate the secure communication. The key goal of this secure communication is to facilitate Quality of Service (QoS) and reliable data transmission in mobile ad-hoc network (MANET) [1,2]. The secure communication in MANET can be established by the combination of trusted mobile nodes and trusted third party.…”
Section: Introductionmentioning
confidence: 99%
“…Authentication is a main process in MANET security that verifies the provided credentials during registration process [6]. Few works [1,2,7] have performed authentication with an aid of blockchain technology to overcome failure during centralized administration when group of attackers combined to target it. Here, the transactions/blocks signature process is performed to provide security in MANET.…”
Section: Introductionmentioning
confidence: 99%