Modified OLSR Protocol for Detection and Prevention of Packet Dropping Attack in MANET
Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Network. It operates as a table driven, proactive protocol. The core of the OLSR protocol is the selection of Multipoint Relays (MPRs), used as a flooding mechanism for distributing control traffic messages in the network, and reducing the redundancy in the flooding process. A node in
Hicham Zougagh+4 more
openalex +3 more sources
Energy Efficiency and Prevention of Packet Dropping Attacks Using IDS Scheme in MANETs [PDF]
A mobile ad-hoc network is an autonomous system, no infrastructure and mobile nodes connected by wireless network. Every mobile nodes in the MANET network is free to move any place and any time any direction in independently. It will change its links to other node continuously.
K C Palanisamy, M Manikannan
openalex +3 more sources
Runtime Mitigation of Packet Drop Attacks in Fault-tolerant Networks-on-Chip
23 pages, 17 ...
Neeli R. Prasad+3 more
openalex +4 more sources
The IDS for Securing MANET from Packet Dropping Attack [PDF]
Ghanshyam Rathore, Prof. Ranjeet Osari
openalex +2 more sources
Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET
Packet drop (grayhole/blackhole) attack is occurs at a network layer to discard the packets in MANET. It is essential to detent and prevent this attack for improving performance of network.
R. B. Patel+2 more
openalex +3 more sources
Eliminating Intentional Packet Dropping Attacks in MANETs Using Promiscuous Mode
Tabassum Begum
openalex +2 more sources
Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography [PDF]
MANET is a decentralized network that has no infrastructure and nodes can communicate with each other by multi-hoping the messages. Due to this nature of MANET, it is prone to many security attacks in which packet drop attacks are very common.
Nitin Khanna
openalex +2 more sources
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things [PDF]
Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering
Zainab Alansari+3 more
doaj +2 more sources
Interest flooding attack mitigation in a vehicular named data network
Vehicular named data network (VNDN) is the next‐generation network architecture for intelligent transportation system. Contrary to the conventional transmission control protocol/internet protocol (TCP/IP) communication model, VNDN follows a data‐centric ...
Muhammad Abdullah+3 more
doaj +1 more source