2016 Symposium on Colossal Data Analysis and Networking (CDAN) 2016
DOI: 10.1109/cdan.2016.7570868
|View full text |Cite
|
Sign up to set email alerts
|

Wormhole attack in mobile ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Qin and Huang [9] have designed a new strategy based on position based routing approach that compromise the transmission anonymity of MANET and identifies end-to-end flow between source and destination with maximum accuracy. The work carried out by Sharma and Jain [10] have concentrated the impact of wormhole Attack in MANET with aim to derive various strategic steps to identify and prevent the mobile nodes from such types of attacks. The work of Shrestha and Nam [11] have, used vector quantization approach in VANET to reduce the effect malevolent vehicles in respect to trust level to other vehicles.…”
Section: Related Workmentioning
confidence: 99%
“…Qin and Huang [9] have designed a new strategy based on position based routing approach that compromise the transmission anonymity of MANET and identifies end-to-end flow between source and destination with maximum accuracy. The work carried out by Sharma and Jain [10] have concentrated the impact of wormhole Attack in MANET with aim to derive various strategic steps to identify and prevent the mobile nodes from such types of attacks. The work of Shrestha and Nam [11] have, used vector quantization approach in VANET to reduce the effect malevolent vehicles in respect to trust level to other vehicles.…”
Section: Related Workmentioning
confidence: 99%
“…In [2], a review on prevention of wormhole attack in MANET is provided. Information related to the security issues is also included.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Basically attack is defined as an attempt to destroy or disrupt the normal functionality of the network and violate the basic security goals such as confidentiality, authentication, integrity, availability and non-repudiation. Various security issues are present in Mobile Ad hoc networks [2]. Attacks are of two types: 1) passive attack-which does not destroy or disrupt network but uses the useful information, it violate confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…Pallavi Sharma et al [9] presented a mechanism which is helpful for detection and defend against the wormhole attack in ad hoc network is "multipath hop counting analysis" (MHA) which tolerant all route request at destination node with in a fixed time period called time to live (TTL) period. In proposed solution, if sender wants to send the data to destination, then secure path is required to create between sender and receiver with the help of multipath hop count analysis and verification of digital signature.…”
Section: Related Workmentioning
confidence: 99%