Reactive Protocols Analysis with Wormhole Attack in Ad-hoc Networks

被引:0
作者
Garg, Gaurav [1 ]
Kaushal, Sakshi [1 ]
Sharma, Akashdeep [1 ]
机构
[1] Panjab Univ, UIET, Chandigarh, India
来源
2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT | 2014年
关键词
Ad hoc; Wormhole; MANETs;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ad-hoc Networks are constantly prone to variety of attacks at different layers because of its features. Wormhole attack is one of the severe attacks which can be implemented in five different modes. This attack acts as a curse as well as boon for the network users. This paper presents the analysis of reactive protocols (AODV, DSR, DYMO, ANODR) with wormhole attack in both mobile and non-mobile ad-hoc networks. Simulations are carried out under Qualnet 4.5.
引用
收藏
页数:7
相关论文
共 23 条
[1]  
Agrawal Richa, 2012, INT J COMPUTER APPL, V44
[2]  
Ali S., 2012, VSRD IJCSIT, V2, P394
[3]  
Arora Mani, 2010, 2 INT C COMP NETW TE, DOI [10.1109/ICCNT.2010.34, DOI 10.1109/ICCNT.2010.34]
[4]  
Bisen Dhananjay, 2009, IJITKM
[5]  
Garg Gaurav, 2013, P INT C COMP COMM NE
[6]  
Gulwade M.P., 2012, WORLD RES J TELECOMM, V1, P13
[7]  
Jain Mohit, 2009, Proceedings of the 2009 International Conference on Advances in Computing, Control, & Telecommunication Technologies (ACT 2009), P555, DOI 10.1109/ACT.2009.141
[8]   Security issues in routing protocols in MANETs at network layer [J].
Joshi, Praveen .
WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
[9]  
Kaur G., 2011, WORLD C INF COMM TEC
[10]  
Kaur P., 2012, INT J COMPUTATIONAL, V2