Analysis of AODV and OLSR Routing Protocols under Wormhole Attack
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
M. Enshaei and Z. B. Hanapi, “A review on wormhole attacks in Manet,†J. Theor. Appl. Inf. Technol., vol. 79, no. 1, pp. 7–21, 2015.
P. North, M. Arena, and P. Area, “Advanced AODV Approach For Efficient Detection And Mitigation Of WORMHOLE Attack IN MANET,†2016, pp. 1–6.
G. Garg, S. Kaushal, and A. Sharma, “Reactive protocols analysis with wormhole attack in ad-hoc networks,†in 5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014, 2014, pp. 7–13.
P. Nagrath and B. Gupta, “Wormhole attacks in wireless Adhoc networks and their counter measurements: A survey,†ICECT 2011 - 2011 3rd Int. Conf. Electron. Comput. Technol., vol. 6, pp. 245–250, 2011.
Z. Tun and A. H. Maw, “Wormhole Attack Detection in Wireless Sensor Networks,†2008, pp. 545–550.
M. Su, “WARP : A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks,†Comput. Secur., vol. 29, no. 2, pp. 208–224, 2010.
C. Gupta and P. Pathak, “Movement based or neighbor based tehnique for preventing wormhole attack in MANET,†2016 Symp. Colossal Data Anal. Networking, CDAN 2016, pp. 1–5, 2016.
M. Salehi, A. Boukerche, and A. Darehshoorzadeh, “Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks,†Ad Hoc Networks, vol. 50, pp. 88–101, 2016.
H. Moudni, M. Er-Rouidi, H. Mouncif, and B. El Hadadi, “Performance analysis of AODV routing protocol in MANET under the influence of routing attacks,†in Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016, 2016, pp. 536–542.
M. Sharma, A. Jain, and S. Shah, “Wormhole attack in mobile ad-hoc networks,†2016 Symp. Colossal Data Anal. Networking, CDAN 2016, pp. 1–4, 2016.
M. Sadeghi and S. Yahya, “Analysis of Wormhole attack on MANETs using different MANET routing protocols,†ICUFN 2012 - 4th Int. Conf. Ubiquitous Futur. Networks, Final Progr., pp. 301–305, 2012.
G. Kaur and A. Kaur, “Performance Analysis of AODV for Wormhole Attack Using Different Mobility Models,†2014, pp. 69–72.