Wormhole attack detection and prevention using EIGRP protocol based on round trip time

K Karthigadevi, S Balamurali… - Journal of Cyber …, 2018 - journals.riverpublishers.com
One of the major harmful attacks in wireless sensor network is wormhole attack. These
attacks are disturbing the routing in networks and create a large amount of traffics …

Graph-based energy supportive routing protocol to resist wormhole attack in mobile adhoc network

SB Geetha, VC Patil - Wireless Personal Communications, 2017 - Springer
With the evolution of numerous secure routing protocols in mobile adhoc network, there is a
tradeoff between the security effectiveness against wormhole attack and energy required to …

[HTML][HTML] 2 Literature Survey

K Karthigadevi, S Balamurali, M Venkatesulu - journals.riverpublishers.com
Ronghui et al.[1] proposed a Beacon Method which provides very low localization error, and
low calculation cost and this method is valid only for layered architecture of the network …

[PDF][PDF] Design of a Secure Architecture for the Internet of Things

S Sathyadevan - 2020 - dro.deakin.edu.au
Design of a secure architecture for the Internet of Things Page 1 Design of a secure architecture
for the Internet of Things AUTHOR(S) Shiju Sathyadevan PUBLICATION DATE 01-07-2020 …