2016
DOI: 10.1016/j.adhoc.2016.07.004
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…SOAR [19] is one of the opportunistic routing protocols based on the proactive link. This is a proactive routing protocol in which each asserts a routing table includes the target, the default route chosen, and the list of participating nodes.…”
Section: Analysis Of Existing Protocolsmentioning
confidence: 99%
“…SOAR [19] is one of the opportunistic routing protocols based on the proactive link. This is a proactive routing protocol in which each asserts a routing table includes the target, the default route chosen, and the list of participating nodes.…”
Section: Analysis Of Existing Protocolsmentioning
confidence: 99%
“…In this paper, we focus on social relationship measurement and the efficient routing schemes, which may have security and privacy problems. Recently, a number of solutions [ 22 , 23 , 24 , 25 , 26 ] have been proposed to deal with the security and privacy issues in information exchange between nodes in MONs. The solutions to the privacy and security problems in the proposed scheme can refer to the related works mentioned above.…”
Section: Social Relationship Measurementmentioning
confidence: 99%
“…There are different types of attacks formed by adversaries [13]. A WSN with satisfactory software and hardware could seize the transferring data in an unauthentic manner [14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%