2017
DOI: 10.1007/s11277-017-4150-2
|View full text |Cite
|
Sign up to set email alerts
|

Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Generally, this type of attack is launched by two or more malicious nodes having a private channel, called a tunnel, between them. Four types of tunnel, packet encapsulation, out-of-band, high power transmission, and packet relay are summarized in [12] and [42]. According to the different malicious nodes participating in these tunnels, we divide wormhole attacks into external wormholes and internal wormholes.…”
Section: A Wormhole Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, this type of attack is launched by two or more malicious nodes having a private channel, called a tunnel, between them. Four types of tunnel, packet encapsulation, out-of-band, high power transmission, and packet relay are summarized in [12] and [42]. According to the different malicious nodes participating in these tunnels, we divide wormhole attacks into external wormholes and internal wormholes.…”
Section: A Wormhole Attacksmentioning
confidence: 99%
“…Wormhole attacks are among the most severe and sophisticated security threats to WSNs routing protocols [11], [12], where malicious nodes are placed strategically to distort the network topology and tunnel packets selectively using the false established routes. Wormhole detection and prevention are very challenging issues [13], [14].…”
Section: Introductionmentioning
confidence: 99%
“…In [15], Desai et al proposed a predictive routing model where they identified the detect sequence number attacks. Kaur et al discussed the performance of AODV, DSR, and ZRP under the impact of multiple wormhole attacker nodes in [16]. Chatterjee et al proposed a number of distributed, secure, trust-aware clustering protocols [17,18,19,20,21] in order to provide secure solution for end-to-end data delivery.…”
Section: Related Workmentioning
confidence: 99%
“…Base on all the challenges mentioned above, scholars have created different protocols to improve communication in MANE. They developed proactive protocol [1], reactive protocol [2], and hybrid protocol [3].…”
Section: Introductionmentioning
confidence: 99%