Topological comparison-based wormhole detection for MANET
Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks. In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depend...
| Main Authors: | , |
|---|---|
| Format: | Journal Article |
| Published: |
John Wiley & Sons
2014
|
| Subjects: | |
| Online Access: | http://onlinelibrary.wiley.com/doi/10.1002/dac.2397/epdf http://hdl.handle.net/20.500.11937/15532 |