• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

N.2013. A Wormhole Attack Resistant Neighbor Discovery Scheme With RDMA Protocol for 60 GHz Directional Network. Emerging Topics in Computing IJCATM : www.ijcaonline.org (0)

by Z Shi, R Sun, R Lu, J Qiao, J Chen, X U E M I Shen
Add To MetaCart

Tools

Sorted by:
Results 1 - 1 of 1

Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET

by S. B. Geetha, Venkanagouda C Patil
"... Security issues in mobile adhoc network (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is ..."
Abstract - Add to MetaCart
Security issues in mobile adhoc network (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is considered one of the most challenging adversarial modules that tremendously affect the communication system in MANET. This paper presents various significant security techniques for mitigating wormhole attack in MANET. The uniqueness of this paper is that it presents a state-of-art study of existing survey papers and potentially emphasized on techniques for detection and prevention of wormhole attack in MANET. Finally, the study also highlights some of the significant findings as well as research gap that stand as prime contribution of the proposed paper.
(Show Context)

Citation Context

...basedsWormhole detections% of detection rate, time benchmarked outcome showsshigher extent of detection rates False positive is not significantlysimproved with increase of timesintervalsShi et al. =-=[61]-=-- 2013-IEEEsRandom delay multiple accesss(RDMA) protocolsNormalized number of timesslots, rate of successfulstransmission nodes,s effectively prevent and detectswormhole attack for 60 GHz networks L...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University