2019
DOI: 10.1109/access.2019.2896001
|View full text |Cite
|
Sign up to set email alerts
|

Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

Abstract: Performance and security are two critical functions of wireless ad-hoc networks (WANETs). Network security ensures the integrity, availability, and performance of WANETs. It helps to prevent critical service interruptions and increases economic productivity by keeping networks functioning properly. Since there is no centralized network management in WANETs, these networks are susceptible to packet drop attacks. In selective drop attack, the neighboring nodes are not loyal in forwarding the messages to the next… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(14 citation statements)
references
References 41 publications
0
14
0
Order By: Relevance
“…8 shows how the data packet drop rate varies with node speed when all nodes in the network are normal nodes. It can be seen from the figure that the algorithm proposed in this paper performs worse than the algorithm in the literature [8] within a certain range of node moving speed. The reason may be that the two paths of AODV-MQS algorithm simultaneously broken in this interval, causing more data packets lost.…”
Section: Simulation Environment and Parameter Settingmentioning
confidence: 77%
See 2 more Smart Citations
“…8 shows how the data packet drop rate varies with node speed when all nodes in the network are normal nodes. It can be seen from the figure that the algorithm proposed in this paper performs worse than the algorithm in the literature [8] within a certain range of node moving speed. The reason may be that the two paths of AODV-MQS algorithm simultaneously broken in this interval, causing more data packets lost.…”
Section: Simulation Environment and Parameter Settingmentioning
confidence: 77%
“…From the above Eq., this chapter concludes that only the greater the connectivity of the node and the smaller the hop number in EERQ, the closer the counter of the node is set to the max value, that is, the larger value the node timer could be got. (8) Judge whether the node is the destination node, if so, go to (10). Otherwise, go to (9).…”
Section: Route Establishmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Poongodi et al [38] proposed an effective lightweight security mechanism named resistive to selective drop attack (RSDA). In a selective drop attack, the neighboring nodes are not reliable in message forwarding to the next node.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…The study has presented a mechanism in order to resist the eavesdropping as well as it can also improvise the secret key generation. Poongodi et al [24] have presented solution against selective packet dropping intrusion in adhoc network. The study has constructed a lightweight protocol along with digital signature in order to identify the malicious nodes.…”
Section: Related Workmentioning
confidence: 99%