2015
DOI: 10.1016/j.procs.2015.07.224
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Detection Features for Wormhole Attacks in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…However, the detection time and false positive rate of this method were high. Imran et al [7] analyzed different wormhole detection techniques and identified a few common limitations of those techniques which may affect the performance of MANETs in different ways. Also, the features of MANETs were identified based on which wormhole attacks can be detected.…”
Section: Literature Surveymentioning
confidence: 99%
“…However, the detection time and false positive rate of this method were high. Imran et al [7] analyzed different wormhole detection techniques and identified a few common limitations of those techniques which may affect the performance of MANETs in different ways. Also, the features of MANETs were identified based on which wormhole attacks can be detected.…”
Section: Literature Surveymentioning
confidence: 99%
“…In a wormhole attack [49,50], the intruder captures the messages in one location and tunnel to another location to a fellow intruder who replays the tunneled messages in another location area. The attack discussed in scenario 3 can be regarded as a wormhole attack.…”
Section: Wormhole Attackmentioning
confidence: 99%
“…In [6] lack of critical factor of control, MANETs are extra prone to routing attacks as compared to other networks. Wormhole attack is one of the most extreme routing attacks, Which is convenient to enforce but tough to detect.…”
Section: Literature Surveymentioning
confidence: 99%