SB Geetha, VC Patil - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Challenges in meeting the best security standards is still an unsolved question in the area of mobile adhoc network especially pertaining to wormhole attack. Although there are many …
With the evolution of numerous secure routing protocols in mobile adhoc network, there is a tradeoff between the security effectiveness against wormhole attack and energy required to …
D Patel, P Trivedi, MB Potdar - International Journal of Computer …, 2015 - Citeseer
ABSTRACT Mobile Ad-hoc Network (MANETs) is a temporary wireless network, which is self- configuring in which nodes moves freely and continuously. It consists of a collection of …
V Sangeetha, SS Kumar - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
The communication behaviour of mobile nodes in adhoc network are quite confusing to understand owing to the decentralized architecture and dynamic topology. The existing …
The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographicmeasures and derail the entire communication network. It is …
Д Кашаіджа - Проблеми телекомунікацій, 2021 - pt.nure.ua
The article is devoted to investigating the effects of wormhole attacks on routing topology in Wireless Sensor Networks (WSNs). Currently, WSNs are increasingly vulnerable to …
DD Bhaiyya - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Internet playing most efficient part in today's interchangeable infrastructure but it has been observed that IP networks affected with common network failures which cause the cautious …