Optimized Scheme for Time-Based Cluster Wormhole Detection Protocol

Download Now
Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Topic: Security
Format: PDF
Modern communication is containing different types of wireless networks as backbone for various applications used for different users. Mobile ad-hoc networks contains many mobile devices and prove to be the good option for communication in various applications including military, industry and remote areas (flood hit areas, nuclear hit areas, etc). Generally due to limitations of energy carrying capacity, on demand routing usually vulnerable to various attacks which can be harmful for ad-hoc communication. Wormhole attack is one of the attacks which are very harmful to the ad-hoc communication.
Download Now

Find By Topic