2017
DOI: 10.1007/s12083-017-0573-5
|View full text |Cite
|
Sign up to set email alerts
|

An optimized intrusion response system for MANET:

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The source node initiates the creation of a route request packet RREQ RREQ contains the following information: the RREQ ID, the destination address, the source address, the destination sequence number, the source sequence number, the NmaxE, and the hop count NmaxE is updated by a node receiving the packet only if its energy level is greater than the current NmaxE; otherwise, NmaxE stays constant Continue checking until RREQ reaches its target The most energy efficient route is chosen from the numerous RREQ collected from several routes If (NmaxE=high &&hopcount=low), choose the communication route A route response RREP is created and returned Data is sent through the newly specified route 3 Wireless Communications and Mobile Computing to create a trust model that decreases the distance to the sink and delays while delivering more reliable packets. This method was established by Mechtri et al [24] as a measure of how well an attack may be evaded. Adversaries in the routing route are notified to source nodes so that they may make better routing decisions.…”
Section: Related Workmentioning
confidence: 99%
“…The source node initiates the creation of a route request packet RREQ RREQ contains the following information: the RREQ ID, the destination address, the source address, the destination sequence number, the source sequence number, the NmaxE, and the hop count NmaxE is updated by a node receiving the packet only if its energy level is greater than the current NmaxE; otherwise, NmaxE stays constant Continue checking until RREQ reaches its target The most energy efficient route is chosen from the numerous RREQ collected from several routes If (NmaxE=high &&hopcount=low), choose the communication route A route response RREP is created and returned Data is sent through the newly specified route 3 Wireless Communications and Mobile Computing to create a trust model that decreases the distance to the sink and delays while delivering more reliable packets. This method was established by Mechtri et al [24] as a measure of how well an attack may be evaded. Adversaries in the routing route are notified to source nodes so that they may make better routing decisions.…”
Section: Related Workmentioning
confidence: 99%
“…These two algorithms are integrated to provide a hybrid trust model that reduces the distance to the sink and delay with better packet delivery. MASID-R-SA is an optimized intrusion response system designed by Mechtri et al [16] as a measure of evading attack-severity. The intensity and nature of the detected adversaries in the routing path are reported effectively to the predecessor and source node to provide better routing choices.…”
Section: Related Workmentioning
confidence: 99%
“…Li Yushuai et al [27] investigated the issue of cooperative distributed energy management of the several multi-bodies along with the optimal energy consideration or generation of entire participant in the single bodies and the optimized distribution of energy at the lines that were interconnected among any pairs of energy bodies.The novelty of the proposed SNS-RR is that it classifies the state of the nodes on the basis of their reward and transition. This state is of the nodes is not estimated on the other existing methods such as [20], [15], & [16]. In another method, such as [13], [18], [21] and [22], optimization is used as an external measure.…”
Section: Related Workmentioning
confidence: 99%
“…Identifying the dropped packet is more challenging. It has two phases: In the initial phase, the malicious node exploits the sender to inform that it has the best route to a target or receiver node 22 In the second phase, the malicious node drops the packets with a certain probability or selectively 23 …”
Section: Introductionmentioning
confidence: 99%