Ensuring the Data Integrity and Authentication in MANET

Download Now
Provided by: International Journals of Advanced Information Science and Technology (IJAIST)
Topic: Security
Format: PDF
Mobile ad hoc networks are the most popular networks widely used in various applications. It consists of mobile nodes where each node communicates with each other. The control of nodes is not administrated by any access point. Due to this, the network is easily impersonated by several attacks like active and passive attacks. These attacks degrade the performance of networks i.e. means network connectivity, network availability and communication coverage. To withstand the wormhole attacks, the authors propose the mechanism called security based wormhole detection scheme.
Download Now

Find By Topic