Proceedings of the International Conference for Phoenixes on Emerging Current Trends in Engineering and Management (PECTEAM 201 2018
DOI: 10.2991/pecteam-18.2018.9
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Mobile Replica Node Attacks in Mobile Computing Environment using GUIDE Technique

Abstract: Mobile computing is a term used to refer to a variety of devices that allow accessing data and information from anytime, anyplace, anywhere. The mobile networks are often deployed in complex environments in which to provide a secure transmission and also to detect the hackers. An adversary can capture and compromise mobile nodes, generate replicas of those nodes, and mount a variety of attacks with the replicas injects into the network. These attacks are dangerous because they allow the attacker to leverage an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 5 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?