The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Packet delivery ratio (PDR) percentage is one of the important network performance indicators in MANETs. In general, the PDR value degrades as speed of the node increases and coupled with high mobility or constant movement. As more nodes move at high speed, more broken path or link breakage occur and thus, more packets will be dropped. Interestingly, PDR rate has also been used to detect packet drop...
Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or packet drop attack is one example of a harmful attack in mobile ad hoc networks. In this study, we implement a series of time-based black hole attack detection of different time intervals and compare the results. We...
Many of the widely used classifiers are time consuming and resource intensive, and hence not practical to be used in the emerging wireless networks. We present an efficient classifier, termed distributed hierarchical graph neuron (DHGN)-based classifier. Our proposed solution uses a new form of neural network, which consists of a hierarchical graph-based representation of input patterns, and adopts...
This paper presents a survey of current methods of detecting black hole attack against ad hoc on-demand distance vector routing protocol in mobile ad hoc networks. In a black hole attack, a malicious node answers each route request with a fake reply claiming to have the shortest and freshest route to the destination. However, when the data packets arrive, the malicious node discards them. Seven detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.