Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/7128
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRaju, V.K.-
dc.contributor.authorKumar, K.V.-
dc.date.accessioned2020-03-30T09:58:32Z-
dc.date.available2020-03-30T09:58:32Z-
dc.date.issued2012-
dc.identifier.citationProceedings: Turing 100 - International Conference on Computing Sciences, ICCS 2012, 2012, Vol., , pp.271-275en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/7128-
dc.description.abstractMobile ad hoc networks are vulnerable to many kinds of attacks since they have unique characteristics like limited bandwidth, limited battery power and dynamic network topology. Among the various attacks possible in mobile ad hoc networks wormhole attack is one which is treated as a very severe attack. In this attack a malicious node records packets at one location in the network and tunnels them to another malicious node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and avoids the wormhole attack in the routing phase itself. Our mechanism is based on the total round trip time (RTT) of the established route and the average round trip times of the sender one hop neighbors, which is considered as maximum one hop round trip time. Our solution works for both mobile ad hoc networks and wireless ad hoc networks. � 2012 IEEE.en_US
dc.titleA simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networksen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
File Description SizeFormat 
7128.pdf243.05 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.