2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) 2017
DOI: 10.1109/iaeac.2017.8054219
|View full text |Cite
|
Sign up to set email alerts
|

STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Kamel et al proposed a secure and trust based approach based on ad hoc on demand distance vector (STAODV) to improve the security of AODV routing protocol [40]. A trust level is used for each node in order to detect the malicious nodes from the network.…”
Section: Deshmukh Et Al Propose a Secure Dsr-based Routing Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…Kamel et al proposed a secure and trust based approach based on ad hoc on demand distance vector (STAODV) to improve the security of AODV routing protocol [40]. A trust level is used for each node in order to detect the malicious nodes from the network.…”
Section: Deshmukh Et Al Propose a Secure Dsr-based Routing Techniquementioning
confidence: 99%
“…Dumne et al proposed a Cooperative Bait Detection method Scheme (CBDS) scheme for the detection of black hole attack [40]. The process for the detection of malicious node is divided into three phases in CBDS i.e.…”
Section: Deshmukh Et Al Propose a Secure Dsr-based Routing Techniquementioning
confidence: 99%
“…In this method, here is a need of composite answer for steering over MANET-IoT systems, which can utilize hub lingering vitality proficiently and broaden the system lifetime. [1]. a) Qualities of MANET 1.…”
Section: Introductionmentioning
confidence: 99%
“…In an IoT system, a major role is played by the wireless sensor network (WSN) as its components comprise: sensing, data acquiring, heterogeneous connectivity and data processing. A wireless, self-configuring and multi-hop network is called mobile ad-hoc network (MANET) [3]. Each MANET node operates as a router or as a network end system and is closely related to WSNs.…”
Section: Introductionmentioning
confidence: 99%