2020
DOI: 10.1007/s12652-020-01825-2
|View full text |Cite
|
Sign up to set email alerts
|

Variable control chart for detecting black hole attack in vehicular ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…If any node provides false information in the status packet, that node is classified as a malicious node. However, the approach is not applicable in large-size networks, because the restricted mobility of nodes is the main drawback of this approach, as their speed cannot exceed 1 m/sec [7]. Rani et al [23] proposed a swarm-based Artificial Bee Colony (ABC) technique against BHA and GHA.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…If any node provides false information in the status packet, that node is classified as a malicious node. However, the approach is not applicable in large-size networks, because the restricted mobility of nodes is the main drawback of this approach, as their speed cannot exceed 1 m/sec [7]. Rani et al [23] proposed a swarm-based Artificial Bee Colony (ABC) technique against BHA and GHA.…”
Section: Related Workmentioning
confidence: 99%
“…These components further yield three classes of communication modes: Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Infrastructureto-Infrastructure (I2I) communications [5], [6]. VANET is the backbone of the ITS, which plays a crucial role in providing real-time and sensitive information to drivers, passengers, and traffic administrative authorities [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…The key problem with this scheme is that it periodically broadcasts a status packet to detect malicious nodes in the network, which results in a huge routing overhead. In [4], Cherkaoui et al proposed a novel method to detect BHAs in VANETs based on using a variable control chart. The method is implemented in each receiving vehicle to detect the BHA through the supervision of the throughput and end-to-end delay metrics.…”
Section: Related Workmentioning
confidence: 99%
“…In essence, a TA is a registration unit that manages the VANET system by registering the OBUs, RSUs, and vehicle users. A VANET is the backbone of the intelligent transportation system (ITS) and it plays a crucial role in supplying real-time and sensitive information to the drivers and traffic authorities [4,5]. Another key component of an ITS is the IoT [6], which transforms conventional VANETs into the Internet of vehicles (IoV), enabling data collection and sharing data about infrastructures, vehicles, humans, and road conditions [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…Other authors [24] have proposed a solution to detect the Black hole attack during communication in a VANET network, their method is based on a variable control chart in order to monitor the quality of a given process and to monitor in general the activities of network and finally they identify potential black hole attacks, the authors test the effeteness of their method by just one routing attack. [25] propose trusted agent-based lightweight surprise check for malevolent node detection in MANET.…”
Section: Related Workmentioning
confidence: 99%