2015
DOI: 10.1016/j.procs.2015.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Gray and Black Hole Attack Identification Using Control Packets in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(20 citation statements)
references
References 5 publications
0
18
0
Order By: Relevance
“…Multiple attackers cannot be handled with this technique. Dhaka et al [8] used two control packets namely code sequence packet and response sequence packet to detect grayhole and blackhole attack. Code sequence packet contains the sender details with sender sequence ID and the response sequence packet contains receiver details with destination sequence ID.…”
Section: Sequence Number Based Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Multiple attackers cannot be handled with this technique. Dhaka et al [8] used two control packets namely code sequence packet and response sequence packet to detect grayhole and blackhole attack. Code sequence packet contains the sender details with sender sequence ID and the response sequence packet contains receiver details with destination sequence ID.…”
Section: Sequence Number Based Detectionmentioning
confidence: 99%
“…Most of the above discussed methodologies relay only on one parameter namely sequence number [8,15,16], packet acknowledgment [17,18,19,20], buffer memory [14] to detect malicious node. This increases false positive and false negative.…”
Section: Acknowledgment Based Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic idea of iTrust is introducing a regularly available Trusted Authority (TA) to judge the node's behavior based on the routing evidences collected and probabilistically checking. Dhaka et al [13] proposed a scheme in which we are sending a control sequence to the neighbor nodes and we are expecting the nodes response. Based on the node response we can identify the malicious node.…”
Section: Related Workmentioning
confidence: 99%
“…The implementation of an algorithm is done in well known network simulator NS-2.34 [13]. The simulation environment is setup to simulate the algorithm in which we take an area of 900x900 to transmit the packet TCP/FTP, UDP/CBR protocol AODV is used and the channel wireless operation mode 802.11, mobility model random waypoint with least frequency 50 Hz is used for the simulation time period of 200 sec.…”
Section: Scenario Setupmentioning
confidence: 99%