73
Views
20
CrossRef citations to date
0
Altmetric
Articles

Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET

&

References

  • Rajendra Aaseri, Nirmal Roberts, Pankaj Choudhary, “Trust value algorithm: a secure approach against packet drop attack in wireless ad-hoc networks” in International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013.
  • Avinash P. Jadhao, Dr.D. N. Chaudhari, “Security Aware Adhoc on Demand Distance Vector Routing Protocol in Vehicular Adhoc Network” in International Journal for Engineering applications and Technology, Vol. 2, Issue 12, December 2015.
  • Charles Harsch, Andreas Festag, Panos Papadimitratos, “Secure Position-Based Routing for VANETs” in IEEE, Vol.2, Issue 12, November 2007.
  • K. R. Viswa Jhananie, C. Chandrasekar, “Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET” in IOSR Journal of Mobile Computing & Application (IOSR-JMCA), Volume 2, Issue 1. (Mar. - Apr. 2015).
  • Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni, “Evaluating the unselfishness of watchdogs for intrusion detection in VANETs”, in IEEE Xplore, Volume 11, November 2010.
  • Gurpreet Singh, Seema, “Malicious Data Detection in VANET” in International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 7, September 2012.
  • Ashwani Kush, Phalguni Gupta & Ram Kumar (2006) Performance evaluation of associative based routing in Adhoc networks, Journal of Interdisciplinary Mathematics, 9:2, 347-361 doi: 10.1080/09720502.2006.10700448
  • Ramesh C. Poonia (2018) Integration of traffic and network simulators for vehicular ad-hoc networks, Journal of Information and Optimization Sciences, 39:7, 1583-1589 doi: 10.1080/02522667.2017.1406580
  • Pankaj Dadheech, Dinesh Goyal, Sumit Srivastava & C. M. Choudhary, (2018), “An Efficient Approach for Big Data Processing Using Spatial Boolean Queries”, Journal of Statistics and Management Systems (JSMS), 21:4, 583-591, doi: 10.1080/09720510.2018.1471258

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.