Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1598
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSasirekha D-
dc.contributor.authorRadha N-
dc.date.accessioned2020-09-21T09:45:38Z-
dc.date.available2020-09-21T09:45:38Z-
dc.date.issued2017-11-
dc.identifier.issn2248-9622-
dc.identifier.urihttps://www.ijera.com/papers/Vol7_issue11/Part-5/O0711058085.pdf-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1598-
dc.description.abstractNowadays with the wide range of applications in wireless networks, there is an increasing need for security of these networks. Specifically, the Mobile Ad-hoc networks are very easy to vulnerable due to many security threats and attacks. These networks have been subjected to numerous attacks among which Sinkhole and wormhole attack are the prominent attacks. In the network routing these attacks should be identified earlier and recovered soon. In the wormhole attack, the data transferred to more routes or the malicious node abused the received data into many ways. In the Sinkhole attack the attacker seeks the data transferred by attracting the node in various ways. Various solutions are found to detect these network attacks. In this paper, a comparative analysis of those techniques is performed. This study finds the impact and suitable methods to prevent and detect wormhole and sinkhole attacks in Mobile ad-hoc networks.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of engineering research and applicationen_US
dc.subjectMANETen_US
dc.subjectNetwork securityen_US
dc.subjectSinkhole attacken_US
dc.subjectWormhole attacken_US
dc.titleA SURVEY ON WORMHOLE AND SINKHOLE ATTACK DETECTION AND PREVENTION TECHNIQUES IN MANETen_US
dc.typeArticleen_US
Appears in Collections:International Journals

Files in This Item:
File Description SizeFormat 
A SURVEY ON WORMHOLE AND SINKHOLE ATTACK DETECTION AND PREVENTION TECHNIQUES IN MANET.docx10.25 kBMicrosoft Word XMLView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.