2013 International Conference on Recent Trends in Information Technology (ICRTIT) 2013
DOI: 10.1109/icrtit.2013.6844214
|View full text |Cite
|
Sign up to set email alerts
|

Efficient malicious detection for AODV in mobile ad-hoc network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…In AODV, intermediate nodes will choose the next hop address. Three basic messages of AODV are shown in below Figure 3 [3].…”
Section: A Brief Of Aodv Routing Protocol [2]mentioning
confidence: 99%
See 1 more Smart Citation
“…In AODV, intermediate nodes will choose the next hop address. Three basic messages of AODV are shown in below Figure 3 [3].…”
Section: A Brief Of Aodv Routing Protocol [2]mentioning
confidence: 99%
“…Simulation is carried out using widely used simulator NS2. M. Amaresh et al [3] proposed technique each node estimates its neighbor's trust value and energy value that is one node has for another node during communication dynamically. Adding trust value and energy value new root value is calculated and maintained in every neighbor table.…”
Section: Related Workmentioning
confidence: 99%
“…Also in [9] proposes a mechanism in which the source node initially works in the same way as in AODV routing protocol. When source node receives RREP messages from different intermediate nodes, it just discards the first RREP message coming from any intermediate node for the avoidance of black.…”
Section: Different Aodv Security Solutions Against Black Hole Attack mentioning
confidence: 99%
“…Paper [19] planned model uses the mixture of trust and energy price primarily based routing protocol known as Energy and Trust primarily based AODV routing protocol (ET-AODV) to ascertain a most trusty routes by providing modification to AODV protocol [32]. In planned technique every node estimates its neighbor's trust price and energy price that's one node has for one more node throughout communication dynamically.…”
Section: Related Workmentioning
confidence: 99%