2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013
DOI: 10.1109/icccnt.2013.6726597
|View full text |Cite
|
Sign up to set email alerts
|

Blackhole attack detection and prevention by real time monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…Node will be judged as genuine or malicious. [18] suggested a scheme called real time monitoring in which neighbor node of RREP generator will maintain a counter for number of packet sent and received by suspicious node. If it does not forward any packet it will be marked as malicious node.…”
Section: Protocol Based On Opinion From Nodesmentioning
confidence: 99%
“…Node will be judged as genuine or malicious. [18] suggested a scheme called real time monitoring in which neighbor node of RREP generator will maintain a counter for number of packet sent and received by suspicious node. If it does not forward any packet it will be marked as malicious node.…”
Section: Protocol Based On Opinion From Nodesmentioning
confidence: 99%
“…al. [24] proposed a method to detect and prevent Black hole Attack using by real time monitoring intermediate node by its neighbor node. When a source node transmits some data it will broadcast RREQ message.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…The protocols [1][2][3][4][5][6][7] aim to mitigate black hole attack taking in account packet drop but not considering the reasons for packet drop.…”
Section: Related Workmentioning
confidence: 99%