Survey on Wormhole Attack Detection Techniques in Mobile Ad-hoc Network

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wormhole Attack in Mobile Ad-hoc Network: A Survey

Security is the one of the major issue that exists in Mobile Ad hoc network. Mobile Ad hoc network is infrastructure less network so it is vulnerable to several security attacks that are on different layers. Wormhole attack is one of the serious routing attack on network layer. This paper focuses on the wormhole attack, its classification and the modes by which they are launched. This paper sum...

متن کامل

Wormhole Attack Detection and Prevention in Mobile Ad-hoc Network Using Authentication Based Delphi

As Mobile Ad-hoc network is infrastructure less network in which every node can take part in data transmission and reception process. Various kinds of attacks have been arises in the network during transmission, which affects on the performance of the network. Wormhole attack is one attack from them which is created by collaborative attackers. Different techniques have developed to detect & pre...

متن کامل

Research Findings on Wormhole Attack Detection in Mobile Ad Hoc Networks

The Internet is moving from the traditional desktop network paradigm to a ubiquitous paradigm where a multitude of small computing devices such as computer chips and smart sensors are involved in daily activities and routines. This means that a rapidly growing amount of devices are connected to the Internet. At the same time, infrastructure-less and self-configuring systems like Mobile Ad hoc N...

متن کامل

Survey of Secure Communication Techniques in Mobile Ad-hoc Network

A Mobile ad hoc Network is an autonomous network comprised of free roaming nodes which communicate wireless by radio transmission. One of the main challenges in MANETs is the design of efficient and light-weight security algorithms that can be handled by devices with limited computational capabilities. Efficiency, reliability and security are (competing) design goals for algorithms suitable for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2015

ISSN: 0975-8887

DOI: 10.5120/21270-4015