A Survey on Wormhole and Sinkhole Attack Detection and Prevention Techniques in Manet
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 11
Abstract
Nowadays with the wide range of applications in wireless networks, there is an increasing need for security of these networks. Specifically, the Mobile Ad-hoc networks are very easy to vulnerable due to many security threats and attacks. These networks have been subjected to numerous attacks among which Sinkhole and wormhole attack are the prominent attacks. In the network routing these attacks should be identified earlier and recovered soon. In the wormhole attack, the data transferred to more routes or the malicious node abused the received data into many ways. In the Sinkhole attack the attacker seeks the data transferred by attracting the node in various ways. Various solutions are found to detect these network attacks. In this paper, a comparative analysis of those techniques is performed. This study finds the impact and suitable methods to prevent and detect wormhole and sinkhole attacks in Mobile ad-hoc networks.
Authors and Affiliations
D. Sasirekha, Dr. N. Radha
Study on Technical & Commercial Losses in Power Distribution System
In India, power distribution system faced a lot of challenges and has to follows new benchmarks on daily basis. The reduction of revenue loss is one of major challenge for the electrical utilities in India. In the electr...
Handwriting Identification By Using Neuro Fuzzy Methods Based On Features Extraction
Handwriting recognition system is a system to recognize one's writing through paper. This technology identifies a unique and fixed piece of writing like human handwriting. The character pattern recognition on human handw...
Channel Estimation Scheme for the Enhanced Reliability in the Flying Ad-hoc Network
This paper proposes the improved channel estimation for flying ad-hoc network (FANET). The FANET means the wireless communication network between the unmanned aerial vehicle (UAV). UAVs have unlimited availability not on...
A Broker based Strategy for Dynamic Resource Negotiation and Allocation in Cloud Aware Application
Cloud computing has became a buzzword owing to availability and on-demand services that have changed the way working of all business organizations resulting in exponentially growth of cloud based applications. IaaS (Infr...
Processed Fly Ash in the Mortar and Concrete: A Review
Use of fly ash in mortar and concrete is very common now days. Use of processed fly ash is recent. Many studies have been conducted to know PFA performance. These studies show information in this regard. In this paper an...