2020
DOI: 10.1007/978-3-030-49342-4_31
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Approach to Detect and Prevent Collaborative Grayhole Attack by Malicious Node in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…The high mobility scenario of the nodes need not be considered as severe but the problem of dropping the calls in the network cannot be ignored. The objective of load balancing scheme is to distribute the load traffic uniformly amongst all the nodes in the network so that none of the node becomes overloaded [9].…”
Section: State-of-the-art Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…The high mobility scenario of the nodes need not be considered as severe but the problem of dropping the calls in the network cannot be ignored. The objective of load balancing scheme is to distribute the load traffic uniformly amongst all the nodes in the network so that none of the node becomes overloaded [9].…”
Section: State-of-the-art Scenariomentioning
confidence: 99%
“…Consider the network "N" which has node "B", the node gets certificate only after completing the process of joining to the network. The trusted server TS issued the following certificate to the node B: (9) where the terms "B" indicates the node, LAB is the logical address for node "B", KB+ is the public key for node "B", TOCC is the time of creation of the certificate, TOEC is the time of expiry of the certificate, and PKTS is the private key of the trusted server. This process helps in authentication of the nodes in the network as when the trusted server verifies the intended nodes in the network, it uses the certificates issued mechanism, the node which could not revert back with correct information is treated only as suspicious node, not the malicious node, the certificate information cannot reveal the node is a malicious node or not [20].…”
Section: Issue Of Certificates For Authenticationmentioning
confidence: 99%
“…Grayhole attack: Grayhole attack is an instance of a blackhole attack where an attacker selectively drops some data packets and normally forwards others [38], or drops all packets but only at a certain time. This makes the attack difficult to detect.…”
mentioning
confidence: 99%