2020
DOI: 10.14569/ijacsa.2020.0110936
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Cluster-Based Approach to Thwart Wormhole Attack in Adhoc Networks

Abstract: Mobile Ad-hoc networks is an ascertaining domain with promising advancements, attracting researchers with a scope of enhancements and evolutions. These networks lack a definite structure and are autonomous with dynamic nature. The strength of the Ad-hoc network lies in the routing protocols making it an apt choice for transmission. With several types of routing protocols available our focus is on LGF (Location-based Geo-casting and Forwarding) protocol that falls in Position based category. LGF assures to grab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…The mitigation classification technique utilizes an aspect of reduced/stop packet transfer. An attack in the middle of the way that interrupts the flow of packets is one of the DOS attacks which slows down the data flow and can defend by grouping into various clusters ( Abdul Basith & Shankar, 2020a ; Abdul Basith & Shankar, 2020b ; Spurthy & Shankar, 2020 ). With network participation of all the nodes for data, transmission needs a large amount of power that can resolve by node optimization.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The mitigation classification technique utilizes an aspect of reduced/stop packet transfer. An attack in the middle of the way that interrupts the flow of packets is one of the DOS attacks which slows down the data flow and can defend by grouping into various clusters ( Abdul Basith & Shankar, 2020a ; Abdul Basith & Shankar, 2020b ; Spurthy & Shankar, 2020 ). With network participation of all the nodes for data, transmission needs a large amount of power that can resolve by node optimization.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Wormhole attacks, which have significant impacts on the network layer, are one of the biggest dangers. Wormhole attacks, according to research, can disrupt network routing, location-based wireless security, and data aggregation [3][4][5][6]. A wormhole attack can be launched by a single node or by a pair of cooperating nodes [7].…”
Section: Introductionmentioning
confidence: 99%