A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Wormhole Detection Algorithm: To Detect Wormhole Attacks Efficiently in Wireless Networks
2016
International Journal of Security and Its Applications
The way of remote specially appointed and sensor systems make them exceptionally alluring to aggressors. A standout amongst the most prevalent and genuine assaults in remote impromptu systems is wormhole assault and most proposed conventions to protect against this assault utilized situating gadgets, synchronized timekeepers, or directional reception apparatuses. We propose a novel calculation for identifying worm-opening assaults in remote multi-bounce systems. The proposed methodology is
doi:10.14257/ijsia.2016.10.9.13
fatcat:jnsvzonnvzhy7jpuvgaqt663vm