<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 8 Issue 4</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>July - August 2020</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2022</Year>
        <Month>03</Month>
        <Day>02</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>VANET-OLSR Cooperative Cross-Layer Detection for Black hole Attacks</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>345</FirstPage>
      <LastPage>348</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Mahesh Kumar Jangid</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
             
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.55524/ijircst.2020.8.4.18</DOI>
      <Abstract>In this study, we address the issue of detecting hot spot problem targeting Multi Point Relays (MPRs) using Vehicular Ad hoc channels Reactive Routing protocol (VANET-OLSR). To identify network-related threats, a watchdog framework has been created in the literature. This strategy, however, depends on routing respect to the variable, as it has a high probability of false positives due to channel collision. As a way to enhance watchdog detection, we offer a cooperative intrusion detector is based on cross-layer architectural that relates both MAC and communication protocol detections. This is done by counting the number of RTS/CTS (please ask to send/clear to transmit) requests issued by watchdogs and detected nodes at the MAC layer, then recalculating the preventing crimes detection % after integrating the data with MAC monitors. The identification of channel collision is aided by cooperative supervision at the networking and MAC levels, which minimizes the number of false alarms. The use of cooperating cross layer architecture improves detection rates and decreases false positives.ve rate, according to simulation findings.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Black Hole, Vanets, Cooperative, Packet Forward, Cross Layer.</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=773</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>