2017 IEEE 85th Vehicular Technology Conference (VTC Spring) 2017
DOI: 10.1109/vtcspring.2017.8108460
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Mitigate Black Hole Attacks on Vehicular Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 13 publications
0
15
0
1
Order By: Relevance
“…Figure 4 compares the proposed method with the Tobin et al method in means of routing overhead. Tobin et al method [20] is based on the query from all intermediate nodes in the active route which implies a lot of overhead in the network. Whereas the proposed method has impressive overhead.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 4 compares the proposed method with the Tobin et al method in means of routing overhead. Tobin et al method [20] is based on the query from all intermediate nodes in the active route which implies a lot of overhead in the network. Whereas the proposed method has impressive overhead.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…In [20], by monitoring the network statistics, the target and source nodes detect and prevent Black-hole attacks. Although this method can detect a Black-hole attack after routing, it is not useful during routing.…”
Section: Research Backgroundmentioning
confidence: 99%
“…The isolation of malicious nodes is more challenging, particularly in VANET. Tobin et al [110] develop a countermeasure for black hole attacks in VANET. The proposed solution focus on multiple steps consisting of (a) attack detection through route backtracking and detecting discrepancies; (b) node accusation; and (c) blacklisting malicious nodes from participating in the network.…”
Section: B: Black Hole Attacksmentioning
confidence: 99%
“…This solution was a multi-step process consisting of attack detection, node accusation, and malicious node blacklisting. 17 The system assigned a unique identifier to each vehicle through electronic vehicle identifier (EVI) that made each vehicle incapable of spoofing. RoselinMary et al 18 suggested an attack packet detection algorithm (APDA) for detecting denial-of-service (DOS) attacks in a VANET.…”
Section: Related Workmentioning
confidence: 99%