2016 IEEE 6th International Conference on Advanced Computing (IACC) 2016
DOI: 10.1109/iacc.2016.53
|View full text |Cite
|
Sign up to set email alerts
|

Secure TORA: Removal of Black Hole Attack Using Twofish Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…So all the traffic intended for that particular node will be lost, causing problem in the network 78 . In this attack, the malicious node called as Blackhole node attracts the other nodes by making them appear to have the greatest path to their destination and thus instead of forwarding the packets to the destination drops the data causing the Denial of Service attack in the network 79 . Blackhole attack is categorized in two ways: a) Single Blackhole attack, and b) Combined Blackhole Attack 78 …”
Section: Security Issues and Attacksmentioning
confidence: 99%
“…So all the traffic intended for that particular node will be lost, causing problem in the network 78 . In this attack, the malicious node called as Blackhole node attracts the other nodes by making them appear to have the greatest path to their destination and thus instead of forwarding the packets to the destination drops the data causing the Denial of Service attack in the network 79 . Blackhole attack is categorized in two ways: a) Single Blackhole attack, and b) Combined Blackhole Attack 78 …”
Section: Security Issues and Attacksmentioning
confidence: 99%
“…Due to its design principles, [18] believe that data transmission among nodes in a MANET network should include protection implementation. As a result, the researchers suggested a cluster-based attack identification and avoidance strategy.…”
Section: Related Workmentioning
confidence: 99%
“…N.Venkatadri et al [12] Adhoc's wireless network is a type of wireless network with no fixed infrastructure. Ad Hoc network devices can work on networks within a specific range.…”
Section: Related Workmentioning
confidence: 99%