Show simple item record

dc.contributor.authorMwangi, Ephantus G.
dc.contributor.authorMuketha, Geoffrey M.
dc.contributor.authorKamau, Gabriel N.
dc.date.accessioned2021-12-17T07:11:36Z
dc.date.available2021-12-17T07:11:36Z
dc.date.issued2020-12
dc.identifier.citationGlobal Journal of Computer Science and Technology: E Network, Web & Security Volume 20 Issue 3 Version 1.0 Year 2020en_US
dc.identifier.issn0975-4172
dc.identifier.urihttps://www.researchgate.net/publication/351098391_Trust-Based_Security_Technique_to_Curb_Cooperative_Blackhole_Attacks_in_Mobile_Ad_Hoc_Networks_using_OTB-DSR_Protocol_in_NS-3_Trust-Based_Security_Technique_to_Curb_Cooperative_Blackhole_Attacks_in_Mo
dc.identifier.urihttps://computerresearch.org/index.php/computer/article/view/1981
dc.identifier.urihttps://www.semanticscholar.org/paper/Trust-Based-Security-Technique-to-Curb-Cooperative-Mwangi-Muketha/eaaeb52f8dafba5c9d0687b405ec218014bb11df
dc.identifier.urihttp://hdl.handle.net/123456789/5502
dc.description.abstractThe advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackhole is a denial of service attack under active attacks. Blackhole nodes work in collaboration forming cooperative black hole attacks. The attacks drop or redirecting data packets on transit. Cooperative blackhole attacks are dangerous in operations where communication is critical. This paper proposes a Trust-Based Resilient Cooperative Bait Detection Technique (TB-RCBDT), an integration of the Resilient Cooperative Bait Detection Technique (RCBDT) and Optimized Trust-Based Dynamic Source Routing (OTB-DSR).en_US
dc.language.isoenen_US
dc.publisherGlobal Journalsen_US
dc.subjectrouting protocol, mobile ad hoc network, security.en_US
dc.titleTrust-Based Security Technique to Curb Cooperative Blackhole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3en_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record