2022
DOI: 10.1007/s00521-022-06946-7
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of black hole attacks using firefly and artificial neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…• Based on Artificial Intelligence [26,33,34,42] A cryptographic paradigm to detect and mitigate blackhole attack is proposed in [13], the proposed method is declared efficient, by the authors, against the black hole attacks. the major inconvenient is the use of RSA Encryption/Decryption which requires high computing performance, while nodes are defined having limited performances.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…• Based on Artificial Intelligence [26,33,34,42] A cryptographic paradigm to detect and mitigate blackhole attack is proposed in [13], the proposed method is declared efficient, by the authors, against the black hole attacks. the major inconvenient is the use of RSA Encryption/Decryption which requires high computing performance, while nodes are defined having limited performances.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [33] have proposed an IDS based on using firefly and artificial neural. According to the authors, the proposed approach enhances the Ad hoc On-Demand Distance Vector routing protocol for combating black hole attacks by leveraging the firefly Algorithm with Artificial Neural Network.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [34] propose an IDS that combines the firefly algorithm with an artificial neural network to enhance the Ad hoc On-Demand Distance Vector (AODV) routing protocol for combating black hole attacks.…”
Section: Related Workmentioning
confidence: 99%
“…It may be sensitive to diverse attacks like DNS cache poisoning attack. These attacks insert the fake DNS records into the cache of the users and directly affect the resolution mapping among the addressing architecture and naming architecture 17 19 . Thus, the entire naming architecture gets insecure owing to the lack of integrity protection of the user records.…”
Section: Introductionmentioning
confidence: 99%