2014
DOI: 10.1007/978-3-662-44966-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…(2) The current black hole avoidance strategies are mostly passive acting systems, which affects system performance. (3) The trust route mechanism has high costs and is difficult to obtain trust, so the guiding significance is limited [35,36].…”
Section: Related Workmentioning
confidence: 99%
“…(2) The current black hole avoidance strategies are mostly passive acting systems, which affects system performance. (3) The trust route mechanism has high costs and is difficult to obtain trust, so the guiding significance is limited [35,36].…”
Section: Related Workmentioning
confidence: 99%
“…According to the concept of Euclidian distance the nodes start detecting their neighbors by sending the route request packets to the neighbors [6]. The route request and the node acknowledgment is provided while detecting the shortest path from the source node to the sink node [8].…”
Section: Node Deployment Algorithmmentioning
confidence: 99%
“…The goal of jellyfish attack is to reduce the performance of network to near about zero without dropping zero or negligible number of packets. Jellyfishattack can be classified into three categories [16,17]: 1) JF reorder attack 2)Periodic Dropping Attack 3)Delay variance attack.…”
Section: Jellyfishattackmentioning
confidence: 99%