2016 International Conference on ICT in Business Industry &Amp; Government (ICTBIG) 2016
DOI: 10.1109/ictbig.2016.7892661
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of AODV under Black hole attack in MANET using NS2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…The sender inserted the information in the packet for controlling the distance of transmission, and some information is included to limit the lifetime of packet. At the receiving side the receiver verifies that whether the packet travels the same distance according to the information included by the sender or not [24]. This protocol needs information of location and synchronized clocks.…”
Section: Solution For Wormhole Attackmentioning
confidence: 99%
“…The sender inserted the information in the packet for controlling the distance of transmission, and some information is included to limit the lifetime of packet. At the receiving side the receiver verifies that whether the packet travels the same distance according to the information included by the sender or not [24]. This protocol needs information of location and synchronized clocks.…”
Section: Solution For Wormhole Attackmentioning
confidence: 99%