2015
DOI: 10.14257/ijsia.2015.9.7.26
|View full text |Cite
|
Sign up to set email alerts
|

Wormhole Attack in Mobile Ad-hoc Network: A Survey

Abstract: Security is the one of the major issue that exists in

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Many authors have published works on methods to identify or detect the wormhole attack, and many survey papers are available to gain an understanding of the landscape of research [10] on wormhole attack. In this paper here, we are interested in discussing about the email dumping attack in particular.…”
Section: Related Workmentioning
confidence: 99%
“…Many authors have published works on methods to identify or detect the wormhole attack, and many survey papers are available to gain an understanding of the landscape of research [10] on wormhole attack. In this paper here, we are interested in discussing about the email dumping attack in particular.…”
Section: Related Workmentioning
confidence: 99%
“…Wormhole Attack Classification. Wormhole attacks are classified into three categories (Khalil, Bagchi, & Shroff, 2005;Azer, El-Kassas, & El-Soudani, 2009;Shrivastava & Dubey, 2015):…”
Section: Dos Attacks Against Routing Schemesmentioning
confidence: 99%
“…Both the techniques detect the wormhole attacks based on local connectivity information. Maulik, and Chaki (2010), Meghdadi, Ozdemir, and Güler (2011), Nagrath, and Gupta (2011) and Shrivastava, and Dubey (2015 conducted good surveys on the wormhole attack detection and prevention techniques.…”
Section: Defense Against Network Layer Attacksmentioning
confidence: 99%