A Comparitive Learning on Wormhole Attack and Black Hole Attack

Download Now
Provided by: International journal of Engineering and Management Research (IJEMR)
Topic: Security
Format: PDF
Network is the open platform where the people share and communicate with each other. Also, the open source will create a majority of problems. Whenever the data or the information's are need to be transferred from one place to another (i.e.) from source to destination it has to be protected by any algorithm in the name of security. Otherwise the data will be hacked by any attackers' namely active attacks or by passive attacks. Wormhole attacks can destabilize or disable wireless sensor networks.
Download Now

Find By Topic