Ensuring the Data Integrity and Authentication in MANET

Download Now Date Added: Apr 2013
Format: PDF

Mobile ad hoc networks are the most popular networks widely used in various applications. It consists of mobile nodes where each node communicates with each other. The control of nodes is not administrated by any access point. Due to this, the network is easily impersonated by several attacks like active and passive attacks. These attacks degrade the performance of networks i.e. means network connectivity, network availability and communication coverage. To withstand the wormhole attacks, the authors propose the mechanism called security based wormhole detection scheme.