2016
DOI: 10.18535/ijecs/v5i8.06
|View full text |Cite
|
Sign up to set email alerts
|

Blackhole Detection and Prevention Strategies in DTN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The bundle protocol [20] is used in order to cope up with the intermittent connectivity which is caused by the black hole attackers. The bundle protocol uses store and forward mechanism.…”
Section: G Bundle Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…The bundle protocol [20] is used in order to cope up with the intermittent connectivity which is caused by the black hole attackers. The bundle protocol uses store and forward mechanism.…”
Section: G Bundle Protocolmentioning
confidence: 99%
“…Comparing the existing EAACK model, MAACK is efficient but it does not provide good efficiency in common. 4 Audit Based Misbehaviour Detection (AMD) [20] Advantage: It successfully and systematically differentiates continuous as well as selective packet droppers. It undergoes packet evaluation without packet overhead.…”
Section: Disadvantagementioning
confidence: 99%