Analytical Review of AODV in Worm Hole Attack

In era of wireless device, MANET is becoming more and more common due to current enhancements. There will be no centralized authority to manage the network. Mobile Ad-hoc NETwork (MANET) is used for tracking and monitoring the attended environment, as nodes are small with limited resources as well as highly mobile. Communication among nodes is accomplished by different routing protocols. But these protocols have different security flaws and attack. Worm hole attack is one of the serious threat in context of ad hoc network, therefore is typically challenging to defend and frequently occurred in wireless systems.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Journal of Advanced Trends in Computer Applications (IJATCA)
Topic:
Security
Format:
PDF