2021
DOI: 10.1016/j.micpro.2020.103352
|View full text |Cite
|
Sign up to set email alerts
|

Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 100 publications
(67 citation statements)
references
References 27 publications
0
51
0
Order By: Relevance
“…Our experiments were performed using the NS-2.35 simulator (NS-2.35 Network Simulator, 2020) with simulation parameters illustrated in Table 2 . We used NS-2.35 for its robustness and maturity, which is the industry standard for simulations, experiments, and testing in other studies (Kumar et al, 2020).…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our experiments were performed using the NS-2.35 simulator (NS-2.35 Network Simulator, 2020) with simulation parameters illustrated in Table 2 . We used NS-2.35 for its robustness and maturity, which is the industry standard for simulations, experiments, and testing in other studies (Kumar et al, 2020).…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Our experiments were performed using the NS-2.35 simulator ( NS-2.35 Network Simulator, 2020 ) with simulation parameters illustrated in Table 2 ( Islam, Taha & Rowayda, 2017 ). We used NS-2.35 for its robustness and maturity, which is the industry standard for simulations, experiments, and testing in other studies ( Kumar et al, 2020 ). Although NS3 is recent compared to NS-2.35, the proposed work should be compared to previous work in ( Lim & Manivannan, 2016 ; Islam, Taha & Rowayda, 2017 ) using NS-2.35.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…The computation of reputation forms the basis of the model. The nodes should compute the reputation associated to neighbors' nodes [22]. This computation is operated with two sub phases.…”
Section: Phase 2: Computation Of Node Reputationmentioning
confidence: 99%
“…However, the delay was improved slightly but it is bearable when delivery got more smooth and better in many cases. [13] Suggested a new algorithm that improves the safety of the AODV routing protocol to come across the black hole attack [14,15]. A progressive type of network which gets handled by the independent node that does not belong to any particular constant network is known as Ad-hoc network.…”
Section: A Manetmentioning
confidence: 99%