SecTORA: Empowerment of TORA Protocol to Deal with the Elimination of Data Packets by Intruder Nodes

Download Now
Provided by: International Journal of Computer Networks and Communications Security (IJCNCS)
Topic: Networking
Format: PDF
One of the attacks that the intruder nodes carry out by penetrating the network is eliminating the data packets, which results in impairing the network efficiency. The method introduced in this paper aims at detecting this attacks and decreasing their effects. The new method is peculiar to those networks which enjoy TCP protocol in their transmission layer. In the present paper one of the famous routing protocols in ad hoc networks, TORA protocol, was studied and the proposed method was implemented on it.
Download Now

Find By Topic