2013 International Conference on Recent Trends in Information Technology (ICRTIT) 2013
DOI: 10.1109/icrtit.2013.6844245
|View full text |Cite
|
Sign up to set email alerts
|

Secure AODV to combat black hole attack in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…However, it's susceptible to the well-known region attack, wherever a malicious node incorrectly advertises smart methods to a destination node throughout the route discovery method. In paper [18], a defense mechanism is given against these region attacks during a Edouard Manet. This methodology makes use of the mackintosh address of the destination to validate every node in its path thereby providing an instantaneous negotiation for secure route.…”
Section: Related Workmentioning
confidence: 99%
“…However, it's susceptible to the well-known region attack, wherever a malicious node incorrectly advertises smart methods to a destination node throughout the route discovery method. In paper [18], a defense mechanism is given against these region attacks during a Edouard Manet. This methodology makes use of the mackintosh address of the destination to validate every node in its path thereby providing an instantaneous negotiation for secure route.…”
Section: Related Workmentioning
confidence: 99%
“…A new trust based routing protocol is proposed by Jawhar et al [17] for the MANETs and other sensor networks which discover secure multi-hop path between the source node and the destination node at the time of data transmission process by which security is increased in communication layer of networks. Narayanan and Radhakrishnan [18] have targeted the black hole attack that launched on the direct root of packet transmission which causes packet dropping factor and data traffic collision. The author [19] has presented an improved AODV protocol routing method with using MAC layer by which nodes have to prove their reliability.…”
Section: Related Workmentioning
confidence: 99%
“…In [10] makes use of the destination's unique identifier to detect the black hole in the network. When destination node receives route request, it replies by using MRREP.…”
Section: Modified Rrep (Mrrep) Messagementioning
confidence: 99%