2020
DOI: 10.1007/s11277-020-07711-6
|View full text |Cite
|
Sign up to set email alerts
|

Defending Against Smart Grayhole Attack Within MANETs: A Reputation-Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 23 publications
0
17
0
Order By: Relevance
“…Furthermore, the qualitative and quantitative node categorisation in existing RTM models has not been exhaustively analysed. Some past works on RTM systems [5,6,[8][9][10][11][12][13][14][15][16][17][18]30] categorised nodes based on the good or bad behaviours they exhibited in the network. In this paper, we presented a categorisation in which a distinctive baseline is drawn between a node's active network operations such as successful, or unsuccessful forwarding of packets, and its passive operations, such as the accuracy of the recommendations disseminated about other nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the qualitative and quantitative node categorisation in existing RTM models has not been exhaustively analysed. Some past works on RTM systems [5,6,[8][9][10][11][12][13][14][15][16][17][18]30] categorised nodes based on the good or bad behaviours they exhibited in the network. In this paper, we presented a categorisation in which a distinctive baseline is drawn between a node's active network operations such as successful, or unsuccessful forwarding of packets, and its passive operations, such as the accuracy of the recommendations disseminated about other nodes.…”
Section: Related Workmentioning
confidence: 99%
“…If node A wants to compute the total reputation of a target node B. Node A sends a second-hand reputation request to all its neighbours that are 1-hop away, apart from node B. Node A has already evaluated the direct reputation vector R ab of node B as R fp , R dp , R mmp 〉 = 0.900, 0.100, 0.000〉. (14) If all the 1-hop neighbours that have previously had an experience with node B send second-hand reputation replies to node A, it carries out the deviation test before computing the aggregated reputation of node B. Only second-hand reputations that are valid are incorporated into the aggregated reputation evaluation as seen in Table 2.…”
Section: Aggregated Second-hand Reputationsmentioning
confidence: 99%
“…The RACODSR [9] proposes a new secure variant of DSR protocol based on a trust evaluation system to identify and defeat smart grayhole attacks. The proposed mechanism combines two interacting subsystems to monitor the node's behavior and investigate their malicious intents.…”
Section: The Reputation-based Ant Colony Optimization Dynamic Source ...mentioning
confidence: 99%
“…Frequent packet drop that lead to lower throughput is another major performance issue that is yet to be solved in these networks. As explained in [19], gray-hole attacks are serious challenges in MANETs. In these attacks, some packets are dropped along the communication path.…”
Section: Introductionmentioning
confidence: 99%