2019 2nd International Conference on Power and Embedded Drive Control (ICPEDC) 2019
DOI: 10.1109/icpedc47771.2019.9036536
|View full text |Cite
|
Sign up to set email alerts
|

Wormhole Attack Detection using Energy Model in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Since, the request to the path is distributed to all hubs in the network, and there is a chance of more intruder nodes in this case, resulting in a worm-hole attack. Thus, Gayathri et al (2019) proposed a worm-hole discovery mechanism to determine the malevolent hub in the system. The worm holes are produced by high-power transmission link and are found using residual energy computation of each hub.…”
Section: Related Workmentioning
confidence: 99%
“…Since, the request to the path is distributed to all hubs in the network, and there is a chance of more intruder nodes in this case, resulting in a worm-hole attack. Thus, Gayathri et al (2019) proposed a worm-hole discovery mechanism to determine the malevolent hub in the system. The worm holes are produced by high-power transmission link and are found using residual energy computation of each hub.…”
Section: Related Workmentioning
confidence: 99%
“…The research of Ref. [53] presented a high-power transmission technique with a high packet delivery ratio and less end-to-end delay for recognising wormholes in mobile ad-hoc networks (MANETs). MANETs use WLAN technology for communication.…”
Section: High-power Transmission-based Systemsmentioning
confidence: 99%
“…It detects wormhole attacks at a high rate and consumes less energy; however, this scheme does not work well in networks with changing communication ranges of nodes. A high-power transmission technique was presented [53], providing a high packet delivery ratio and less end-to-end delay. However, this scheme uses the AODV protocol, which provides no scalability [70].…”
Section: Performance Analysis 41 Critical Analysismentioning
confidence: 99%
“…Moreover, the wireless link and nodes are highly susceptible to attacks. The communication channel is affected by several malicious activities such as WH attacks [21], GH attacks [22], DDoS attacks [23], and BH attacks [24]. The most common attack in MANET is the WH attack, which can be dropped the packets and break the link.…”
Section: Problem Statementmentioning
confidence: 99%