2020
DOI: 10.31838/jcr.07.06.65
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Attackers Using Blockchain Transactions Using Cryptography Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…By using Blockchain method in MANET, security levels are much improved and routing process is also clear [19]. Blockchain method is involved when a route is identified, nodes involved in communication are fixed, routing table is finalized, source and destination nodes are selected, data packets are transferred to the destination, malicious nodes are identified [20]. All these operations are grouped as a Block and a transaction is finalized.…”
Section: Security In Blockchainmentioning
confidence: 99%
“…By using Blockchain method in MANET, security levels are much improved and routing process is also clear [19]. Blockchain method is involved when a route is identified, nodes involved in communication are fixed, routing table is finalized, source and destination nodes are selected, data packets are transferred to the destination, malicious nodes are identified [20]. All these operations are grouped as a Block and a transaction is finalized.…”
Section: Security In Blockchainmentioning
confidence: 99%
“…Logistic Regression (LR) is one of the most commonly used method for applied statistics and discrete data analysis and often works surprisingly well as a classifier [27]. When the target outcome has only two types, it can be called a binary classification problem [28].…”
Section: A Machine Learning Modelsmentioning
confidence: 99%
“…The MANET is a portable network and can be formed wherever necessary and because of its dynamic nature, MANETs frequently undergo several attacks [19]. The proposed method needs to improve security for the data in the network to improve packet delivery rate and the throughput of the system [20].…”
Section: Introductionmentioning
confidence: 99%