Matches in SemOpenAlex for { <https://semopenalex.org/work/W2123188151> ?p ?o ?g. }
Showing items 1 to 55 of
55
with 100 items per page.
- W2123188151 endingPage "91" @default.
- W2123188151 startingPage "84" @default.
- W2123188151 abstract "Mobile Ad hoc networks are increasingly popular these days as they function without major requirements of state of the art infrastructure and the fact that they can function without the need for a central controlling authority. The widespread usage of the MANETs (Mobile Ad hoc networks) also poses some serious problems in them. Because of the high availability of MANETs and improper security measures make the MANETs a ready target for attackers which adopt both active and passive approach to attack the MANET. A classic attack on a MANET is a DOS attack of which wormhole attack is most noteworthy as it is easy to deploy and can cause great damage to the network. In the wormhole attack, an adversary connects two distant points in the network using a direct low-latency communication link in the MANET which is called as wormhole link. Once a wormhole is established, the adversary captures the wireless transmissions on one end and send them through the wormhole link and replays them on the other end. There are many methods available for wormhole detection which include in some cases the use of sophisticated hardware and in other cases makes some modification to the already present information in the MANET. The presence of a wormhole may also be detected in some cases by the use of time delays or geographical locations. A wormhole can be detected when the network has already been set up and wormhole nodes try to penetrate at a later time and secondly when the wormhole nodes were already present in the time of network setup. In this paper, we adopt a new approach which is different from the already existing approaches of wormhole detection. The approach adopted by us has the benefit of saving memory and processing which is an improvement over the other techniques of wormhole detection. It also advocates the use of a modified routing table wherein the routing table will be modified to have an extra consisting of full paths of each node next to the hop. Using this approach of modified routing table, we can identify suspicious links long before the attack takes place and starts disturbing the network. This approach is implemented on various routing protocols with the help of NS3 and a comparative analysis has been made for the same. A comparison of this approach with some other techniques of wormhole detection is also carried out to highlight the effectiveness and efficiency of this approach." @default.
- W2123188151 created "2016-06-24" @default.
- W2123188151 creator A5003533236 @default.
- W2123188151 creator A5030443480 @default.
- W2123188151 creator A5072690930 @default.
- W2123188151 date "2014-01-01" @default.
- W2123188151 modified "2023-10-05" @default.
- W2123188151 title "Implementation and Comparison of a New Wormhole Detection Technique with Existing Techniques" @default.
- W2123188151 cites W1583345160 @default.
- W2123188151 cites W1831773712 @default.
- W2123188151 cites W2065809000 @default.
- W2123188151 cites W2106266945 @default.
- W2123188151 cites W2159178493 @default.
- W2123188151 cites W2189025454 @default.
- W2123188151 doi "https://doi.org/10.9790/0661-16368491" @default.
- W2123188151 hasPublicationYear "2014" @default.
- W2123188151 type Work @default.
- W2123188151 sameAs 2123188151 @default.
- W2123188151 citedByCount "0" @default.
- W2123188151 crossrefType "journal-article" @default.
- W2123188151 hasAuthorship W2123188151A5003533236 @default.
- W2123188151 hasAuthorship W2123188151A5030443480 @default.
- W2123188151 hasAuthorship W2123188151A5072690930 @default.
- W2123188151 hasBestOaLocation W21231881511 @default.
- W2123188151 hasConcept C121332964 @default.
- W2123188151 hasConcept C2522767166 @default.
- W2123188151 hasConcept C29013271 @default.
- W2123188151 hasConcept C33332235 @default.
- W2123188151 hasConcept C41008148 @default.
- W2123188151 hasConceptScore W2123188151C121332964 @default.
- W2123188151 hasConceptScore W2123188151C2522767166 @default.
- W2123188151 hasConceptScore W2123188151C29013271 @default.
- W2123188151 hasConceptScore W2123188151C33332235 @default.
- W2123188151 hasConceptScore W2123188151C41008148 @default.
- W2123188151 hasIssue "3" @default.
- W2123188151 hasLocation W21231881511 @default.
- W2123188151 hasOpenAccess W2123188151 @default.
- W2123188151 hasPrimaryLocation W21231881511 @default.
- W2123188151 hasRelatedWork W1559812758 @default.
- W2123188151 hasRelatedWork W1645600878 @default.
- W2123188151 hasRelatedWork W1976900091 @default.
- W2123188151 hasRelatedWork W2020906548 @default.
- W2123188151 hasRelatedWork W2748952813 @default.
- W2123188151 hasRelatedWork W2899084033 @default.
- W2123188151 hasRelatedWork W3151879693 @default.
- W2123188151 hasRelatedWork W4300704821 @default.
- W2123188151 hasRelatedWork W43256430 @default.
- W2123188151 hasRelatedWork W973458616 @default.
- W2123188151 hasVolume "16" @default.
- W2123188151 isParatext "false" @default.
- W2123188151 isRetracted "false" @default.
- W2123188151 magId "2123188151" @default.
- W2123188151 workType "article" @default.