2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) 2016
DOI: 10.1109/iciccs.2016.7542314
|View full text |Cite
|
Sign up to set email alerts
|

Reviewing the impact of wormhole attack in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…If we let down our safeguards, an attacker can rework the routing protocol and interrupt the network operations thru mechanisms consisting of packet drops, flooding, data fabrication and many others. MANET is a shape of network whose dynamic topology, decentralizing governance and other such capabilities are generally in favour of many security attacks [12]. Ankit Agrawal, et al [2014] This paper proposes and evaluates a singular Coordinated Node Monitoring & Response (CNMR) Based IDS via AACK for AODV protocol It is a multistep manner in which the node & its transmission are in control of some monitoring node.…”
Section: Wormhole Attacksmentioning
confidence: 99%
“…If we let down our safeguards, an attacker can rework the routing protocol and interrupt the network operations thru mechanisms consisting of packet drops, flooding, data fabrication and many others. MANET is a shape of network whose dynamic topology, decentralizing governance and other such capabilities are generally in favour of many security attacks [12]. Ankit Agrawal, et al [2014] This paper proposes and evaluates a singular Coordinated Node Monitoring & Response (CNMR) Based IDS via AACK for AODV protocol It is a multistep manner in which the node & its transmission are in control of some monitoring node.…”
Section: Wormhole Attacksmentioning
confidence: 99%