Topological comparison-based wormhole detection for MANET

Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks. In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depend...

Full description

Bibliographic Details
Main Authors: Chan, King-Sun, Alam, Mohammad
Format: Journal Article
Published: John Wiley & Sons 2014
Subjects:
Online Access:http://onlinelibrary.wiley.com/doi/10.1002/dac.2397/epdf
http://hdl.handle.net/20.500.11937/15532