A brief Analysis on Detection and Avoidance Techniques of Wormhole Attack in MANET
نویسندگان
چکیده
منابع مشابه
A two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملAvoiding Wormhole Attack in MANET using Statistical Analysis Approach
MANET is a collection of mobile hosts with wireless network interfaces that form a temporary network without any fixed infrastructure or centralized administration. MANET is infrastructure-less, lack of centralized monitoring and dynamic changing network topology. MANET is highly vulnerable to attack due to open error prone shared wireless medium. In this paper, we proposed an algorithm for avo...
متن کاملSecuring MANET against Wormhole Attack using Neighbor Node Analysis
In mobile ad hoc networks (MANETs) security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile ad hoc networks in which a pair of colluding nodes make...
متن کاملa contrastive analysis of concord and head parameter in english and azerbaijani
این پایان نامه به بررسی و مقایسه دو موضوع مطابقه میان فعل و فاعل (از نظر شخص و مشار) و هسته عبارت در دو زبان انگلیسی و آذربایجانی می پردازد. اول رابطه دستوری مطابقه مورد بررسی قرار می گیرد. مطابقه به این معناست که فعل مفرد به همراه فاعل مفرد و فعل جمع به همراه فاعل جمع می آید. در انگلیسی تمام افعال، بجز فعل بودن (to be) از نظر شمار با فاعلشان فقط در سوم شخص مفرد و در زمان حال مطابقت نشان میدهند...
15 صفحه اولWeeding Wormhole Attack in MANET Multicast Routing using Two Novel Techniques - LP3 and NAWA2
Mobile Adhoc Network (MANET) with its unique and special characteristics is prone to a host of security threats from within and outside the network. The MANET architecture is well suited for conducting multicast communications as this greatly reduces the number of multicast packets traversing the network. The replication of multicast packets by the intermediate downstream multicast router is de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/20638-3317