Download now Free registration required
Like any other wireless network, mobile ad-hoc networks are highly vulnerable to security threats coming from various intruders. Attacks launched by nodes that are part of the network, have attracted attention of research fraternity. A malicious node may work in a manner to increase the transfer delay and hence disrupt the working of network. Successful implementation of packet telephony is subject to constraints imposed by various QoS parameters including end-to-end delay. In this paper, authors have tried to gauze the adverse effect on end-to-end delay caused by the presence of various nodes with malicious intention in the network.
- Format: PDF
- Size: 410 KB