2021
DOI: 10.1007/s11277-021-08647-1
|View full text |Cite
|
Sign up to set email alerts
|

Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET

Abstract: Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole. During this they take a path which is the shortest for the place where it has to reach. During sending of message two types of attacks are generally seen such as the blackhole attack and the wormhole attack. In this research we have tried to focus on two major attacks such as the black hole and the worm hole attack. In this we have us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(20 citation statements)
references
References 29 publications
0
19
0
Order By: Relevance
“…Throughput drops as network size increases. 57 En-ID 16 For 100 to 300 event occurrences, The detection rate lies between 75-85%.…”
Section: Results For Metrics Findings Limitationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Throughput drops as network size increases. 57 En-ID 16 For 100 to 300 event occurrences, The detection rate lies between 75-85%.…”
Section: Results For Metrics Findings Limitationsmentioning
confidence: 99%
“…It shows improved performance in terms of delay, delivery ratio, and throughput. 57 Wormhole attacks can also be identified from the bogus report injection by cross checking the node ID and hop count for the sender. It requires a statistical en-route filtering report.…”
Section: Authentication Key-based Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Security is also used to the data transmission phase in this proposed work to secure a user's sensitive data. Elliptic Curve Cryptography (ECC) [43], which encrypts data before transmission, is used for this. ECC is a data encryption method based on keys.…”
Section: Phase 4: Secure Transmission Phasementioning
confidence: 99%
“…Moreover, selfdetection experiences have an effect on optimistic or pessimistic position of a network node and therefore affect the decision to collect confidential information in the neighbourhood. The proposed ESCT Protocol has the following key elements in comparison with existing preventive routing schemes [14]: researchers are intuitively aware that it is difficult to guarantee the reliable routing of MANET with high mobility. We will show in this paper that mobility can effectively improve the safety.…”
Section: Introductionmentioning
confidence: 99%