An Efficient Approach for Wormhole detection in MANET
Abstract
References
- An Efficient Approach for Wormhole detection in MANET
Recommendations
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesIn Mobile Ad hoc Network (MANET) is a self-organizing session of communication between wireless mobile nodes build up dynamically regardless of any established infrastructure or central authority. In MANET each node behaves as a sender, receiver and ...
An Improved Clustering-Based Approach for Wormhole Attack Detection in MANET
ICECCS '14: Proceedings of the 2014 3rd International Conference on Eco-friendly Computing and Communication SystemsAdvancement in wireless technologies and improved use of wireless devices demand more and more infrastructure less networks like Mobile Ad hoc Networks (MANET). MANETs are becoming common, since they can be deployed easily in a cost effective manner ...
MANET Routing Protocols Comparison for Composite Traffic Network
IMCCC '13: Proceedings of the 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and ControlThe choice of routing protocols is an important issue in the establishment and design of Ad hoc networks. However, existing routing protocols are based on single traffic source or simple traffic models used in conventional networks like HTTP and video ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 79Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in