Examination of AODV Routing Protocol with Wormhole Attack
نویسندگان
چکیده
منابع مشابه
The Efficient Prevention of Wormhole Attack in AODV Routing Protocol in Wireless Sensor Networks
Wireless sensors networks (WSNs) consist of a large number of tiny, spatially distributed, and autonomous devices, called sensor nodes. The latter are equipped with sensing, computation, and wireless communications capabilities, and have very limited resources. Wireless sensor networks have been widely used in remote areas, military scenarios, sensing motion applications, agriculture solutions ...
متن کاملPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they ...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملAnalysis and Parameterized Evaluation of Impact of Wormhole Attack Using AODV Protocol in MANET
In recent years, ubiquitous computing using Mobile Ad Hoc Networks (MANET) created many researches in all the application areas. Since the nodes in MANET are small with limited resources, highly mobile and has no centralized administrative control, it is used for tracking and monitoring in unattended environments. Dynamic topological changes due to the high mobility of the nodes make challenges...
متن کاملA Comprehensive Review on Performance of Aodv Protocol for Wormhole Attack
Wireless Networking is becoming very popular and interesting technology especially in these days as everyone wants wireless connectivity at anywhere anytime. It contains numerous wireless network technologies such as WiFi, WiMax, HSDPA and WiBro etc. Based on structural arrangement, wireless networks are categorized into two main categories: fixed infrastructure wireless networks and infrastruc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016908415