2014 Fourth International Conference on Communication Systems and Network Technologies 2014
DOI: 10.1109/csnt.2014.50
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Watchdog Protocol with AODV in Mobile Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 7 publications
0
18
0
Order By: Relevance
“…Hence, the proposed solution can be said to provide a reliable authentication of the transmitted messages within multiple nodes in VANET. Varshney et al (2014) addressed that black hole attach usually attempt to send route response incorrectly to destination with minimum hop count which results in slowing down the packet delivery ration based on this malicious node in a network. However, the proposed solution was found to provide a compatible packet delivery ration in which transmitted packets are examined for any potential attack within nodes.…”
Section: Discussionmentioning
confidence: 99%
“…Hence, the proposed solution can be said to provide a reliable authentication of the transmitted messages within multiple nodes in VANET. Varshney et al (2014) addressed that black hole attach usually attempt to send route response incorrectly to destination with minimum hop count which results in slowing down the packet delivery ration based on this malicious node in a network. However, the proposed solution was found to provide a compatible packet delivery ration in which transmitted packets are examined for any potential attack within nodes.…”
Section: Discussionmentioning
confidence: 99%
“…Varshney et al, [20] proposed a monitoring method called Watchdog AODV mechanism to form detect black hole nodes in mobile adhocnetworks.In this method nodes act as watchdogs monitor their neighbors locally using control messages by listening to all nodes within transmission range to detect misbehaving as well as black hole node. Black hole node once detected, is excluded from the path of transmitting messages.…”
Section: S S Bajwa and M K Khanmentioning
confidence: 99%
“…Thus, the trust of path is equal to the most unreliable link of that path. This mechanism is simulated in MATLAB 2013a and is compared against W-AODV [34] for parameters like PDR, control overhead, accuracy and reliability of path. This mechanism proves to be efficient in formulating reliable paths and avoiding Blackhole attack.…”
Section: Trueness Levelmentioning
confidence: 99%