Mar 15, 2017 · Neelima Singla, Ramanjeet Singh (2017). Wormhole Attack Prevention and Detection in MANETs Using HRL Method. International Journal of Advance ...
Abstract: In order to prevent MANET from wormhole attack a new method is proposed. In this, wormhole attack in MANET is detected and prevented by using Hop ...
Missing: published | Show results with:published
The proposed approach is based on Smart Packet, wormhole infected nodes can be detected based on acceptance of the smart packets by the nodes in the network.
Missing: HRL published IJARIIT
Feb 10, 2024 · The proposed detection and isolation mechanism is based on the 50% of neighboring nodes, which should report the malicious nature of the attacker.
Missing: HRL IJARIIT
In this research we proposed Wormhole attack Intrusion Detection as well as prevention Security Scheme (WIDPS) against wormhole attack using the IDP nodes.
Missing: HRL IJARIIT
In this paper, we proposed a wormhole attach detection and prevention mechanism incorporated AODV routing protocol, using neighbour discovery and path ...
Missing: HRL IJARIIT
In this paper, we proposed a wormhole attach detection and prevention mechanism incorporated AODV routing protocol, using neighbour discovery and path ...
Missing: MANETs HRL IJARIIT
Aug 28, 2024 · This research suggested two strategies for identifying and avoiding wormhole attacks: hop-count analysis and specification-based intrusion ...
Missing: HRL IJARIIT
People also ask
What is wormhole attack in Manet?
A wormhole attack is a type of security threat in wireless ad hoc networks where an attacker can easily implant malicious nodes without compromising any legitimate nodes. This attack is difficult to detect and can be launched without prior knowledge of the network.
What are wormhole attacks?
A wormhole attack is a passive attack that creates a separate unauthorized link between two communicating nodes, subsequently causing the legitimate nodes to send data through this link. Thus, the data are intercepted, and the corresponding nodes are compromised.
In order to show you the most relevant results, we have omitted some entries very similar to the 8 already displayed.
If you like, you can repeat the search with the omitted results included. |