A SURVEY ON WORMHOLE AND SINKHOLE ATTACK DETECTION AND PREVENTION TECHNIQUES IN MANET

dc.contributor.authorSasirekha D
dc.contributor.authorRadha N
dc.date.accessioned2020-09-21T09:45:38Z
dc.date.available2020-09-21T09:45:38Z
dc.date.issued2017-11
dc.description.abstractNowadays with the wide range of applications in wireless networks, there is an increasing need for security of these networks. Specifically, the Mobile Ad-hoc networks are very easy to vulnerable due to many security threats and attacks. These networks have been subjected to numerous attacks among which Sinkhole and wormhole attack are the prominent attacks. In the network routing these attacks should be identified earlier and recovered soon. In the wormhole attack, the data transferred to more routes or the malicious node abused the received data into many ways. In the Sinkhole attack the attacker seeks the data transferred by attracting the node in various ways. Various solutions are found to detect these network attacks. In this paper, a comparative analysis of those techniques is performed. This study finds the impact and suitable methods to prevent and detect wormhole and sinkhole attacks in Mobile ad-hoc networks.en_US
dc.identifier.issn2248-9622
dc.identifier.urihttps://www.ijera.com/papers/Vol7_issue11/Part-5/O0711058085.pdf
dc.identifier.urihttps://dspace.psgrkcw.com/handle/123456789/1598
dc.language.isoenen_US
dc.publisherInternational Journal of engineering research and applicationen_US
dc.subjectMANETen_US
dc.subjectNetwork securityen_US
dc.subjectSinkhole attacken_US
dc.subjectWormhole attacken_US
dc.titleA SURVEY ON WORMHOLE AND SINKHOLE ATTACK DETECTION AND PREVENTION TECHNIQUES IN MANETen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
A SURVEY ON WORMHOLE AND SINKHOLE ATTACK DETECTION AND PREVENTION TECHNIQUES IN MANET.docx
Size:
10.25 KB
Format:
Microsoft Word XML
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: