2013 Fifth International Conference on Communication Systems and Networks (COMSNETS) 2013
DOI: 10.1109/comsnets.2013.6465569
|View full text |Cite
|
Sign up to set email alerts
|

Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
26
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(26 citation statements)
references
References 9 publications
0
26
0
Order By: Relevance
“…SDBG achieves a detection rate of at least 70% with false positive rate below 1.6%. Compared to state-ofthe-art schemes [14], [15], SDBG can detect collusion attack with higher accuracy and lower false positive rate.…”
Section: Introductionmentioning
confidence: 92%
“…SDBG achieves a detection rate of at least 70% with false positive rate below 1.6%. Compared to state-ofthe-art schemes [14], [15], SDBG can detect collusion attack with higher accuracy and lower false positive rate.…”
Section: Introductionmentioning
confidence: 92%
“…They first submit their tickets and then reveal their contact history to one another. Similarly, Guo et al [24,25] proposed Misbehavior Detection System (MDS) that helps in finding malicious nodes in vehicular DTNs. They also used the concept of encounter tickets similar to [23].…”
Section: Related Workmentioning
confidence: 97%
“…They also used the concept of encounter tickets similar to [23]. The schemes [23][24][25] detect the presence of malicious nodes in the network. However, these schemes would not be able to detect the isolator from the network because isolator neither drops nor forwards other nodes messages.…”
Section: Related Workmentioning
confidence: 99%
“…Due to such unusual network behavior, DTN uses store-carry-forward model as message propagation process. In store-carry-forward model, DTN node will send message to intermediate nodes only if it gets an opportunity or only if it comes in range of other node else it elect to save the node in its buffer [1]. Also there may be possibility of long run persistent buffer storage.…”
Section: Introductionmentioning
confidence: 99%