An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack
نویسندگان
چکیده
منابع مشابه
nano-rods zno as an efficient catalyst for the synthesis of chromene phosphonates, direct amidation and formylation of amines
چکیده ندارد.
An efficient wormhole attack detection method in wireless sensor networks
Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially des...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملFrequency Based Detection Algorithm of Wormhole Attack in WSNs
The main Importance of Research paper is to propose a new algorithm for the detection of wormhole Attack in the WSNs. Wormhole Attack is the severe attack on WSN routing protocols. Two malicious nodes create an illusion that they are very close to each other by setting up low latency link(wormhole tunnel), retrieve data packets on one part and transmit it to another part of the network via that...
متن کاملAn Improved DV-Hop Algorithm for Resisting Wormhole Attack
As DV-Hop algorithm estimates distance by distance vector exchanging, positioning process is vulnerable to devastate wormhole attacking. An improved DV-Hop algorithm (AWADV-Hop) which resists wormhole attack is proposed, based on the original algorithm in this paper. To solve the problem that hops and the average distance per hop is the most vulnerable to wormhole attack in DV-Hop. This paper f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mehran University Research Journal of Engineering and Technology
سال: 2016
ISSN: 0254-7821,2413-7219
DOI: 10.22581/muet1982.1603.06