2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) 2017
DOI: 10.1109/iccubea.2017.8463762
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Removal Of Node Isolation Attack In OLSR Protocol Using Imaginary Nodes with Neighbour Response in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…At the same time, the OLSR protocol retains the routes of all destination nodes to cope with large-scale node exchanges, making it suitable for large and dense networks [50]. The control messages of this protocol do not rely on reliable transmission, but on periodic delivery by nodes, so it can cope with a loss of some packets occasionally [51,52].…”
Section: Olsr Protocolmentioning
confidence: 99%
“…At the same time, the OLSR protocol retains the routes of all destination nodes to cope with large-scale node exchanges, making it suitable for large and dense networks [50]. The control messages of this protocol do not rely on reliable transmission, but on periodic delivery by nodes, so it can cope with a loss of some packets occasionally [51,52].…”
Section: Olsr Protocolmentioning
confidence: 99%
“…l l (10) The PO 33 is efficient in solving engineering problems and leads to the global optimal solution. As per PO, the update position is expressed as…”
Section: Substitutementioning
confidence: 99%
“…Multi‐UAV comprises various wireless communication models, camera, server sensors, and Global Positioning System (GPS) to accumulate and send huge‐sized data to the ground station 7 . Quicker deployment of Wireless Sensor Network (WSN) and the capability of adapting UAV in Internet of Everything (IoE) through the wireless network can be subject to different attacks, like key impersonation and replay attacks 8–10 . The easier deployment and mobility of UAV 11 has given rise to novel kinds of smart attacks in wireless technologies that perform as spoofers, eavesdroppers, 12 and jammers.…”
Section: Introductionmentioning
confidence: 99%
“…establishment of IoT has augmented the application of networked smart homes. The expansion of smart devices using IoT generates accessibility, comfortability, and security 7,8 in life. IoT poses several benefits, which involved flexibility, cost reduction, and energy consumption.…”
mentioning
confidence: 99%