2018
DOI: 10.14419/ijet.v7i3.6.15133
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Honey Bee Model to Avoid Sleep Deprivation Attack in MANET

Abstract: Ad-hoc networks are highly vulnerable to the attacks due to the dynamic nature of the network topology, lack of centralized management and cooperative algorithm. Nodes in the ad-hoc network are responsible to transmit packets to other nodes. One of many different kinds of attacks, a node may experience the exhaustion of power by consuming its batter power. Routing protocol controls the packet transmission over the network and calculates the routing path for transmission. The predefined static routed path is li… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Sleep Deprivation Attack [47][48][49] As part of a sleep deprivation or denial-of-sleep exploit, a malevolent device transmits requests to target endpoints only at the frequency required for keeping them active. Therefore, unlike in a barrage assault, the target devices are kept awake but are not forced to carry out any particularly taxing tasks.…”
Section: Attack Portrayal Purposementioning
confidence: 99%
“…Sleep Deprivation Attack [47][48][49] As part of a sleep deprivation or denial-of-sleep exploit, a malevolent device transmits requests to target endpoints only at the frequency required for keeping them active. Therefore, unlike in a barrage assault, the target devices are kept awake but are not forced to carry out any particularly taxing tasks.…”
Section: Attack Portrayal Purposementioning
confidence: 99%