2018
DOI: 10.14569/ijacsa.2018.090463
|View full text |Cite
|
Sign up to set email alerts
|

Combating the Looping Behavior: A Result of Routing Layer Attack

Abstract: Abstract-Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them at risk of routing attacks. A wormhole is the most treacherous attack on a routing layer of wireless ad hoc networks. The present proposed techniques require extra hardware, clock synchronization; or they make restrict assumption to deal with this attack. We have proposed a simple behav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 45 publications
0
1
0
Order By: Relevance
“…Sometimes, they are also classified on the basis of attack vectors such as packet encapsulation, relay, high transmission power, high-quality link (out-of-band channel) or protocol deviation. We can study them further from 43,58,59 . The concept of a wormhole is discussed below with the help of two use cases they may help in deciding the thresholds of alerts.…”
Section: Wormhole Attack Scenariosmentioning
confidence: 99%
“…Sometimes, they are also classified on the basis of attack vectors such as packet encapsulation, relay, high transmission power, high-quality link (out-of-band channel) or protocol deviation. We can study them further from 43,58,59 . The concept of a wormhole is discussed below with the help of two use cases they may help in deciding the thresholds of alerts.…”
Section: Wormhole Attack Scenariosmentioning
confidence: 99%