2008 the Fourth International Conference on Wireless and Mobile Communications 2008
DOI: 10.1109/icwmc.2008.49
|View full text |Cite
|
Sign up to set email alerts
|

SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad Hoc Networks against Wormhole Attacks

Abstract: In this paper, we present a very simple and efficient endto-end

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…A single malicious node can launch this attack by broadcasting the route request at a high power level [7]. If multiple malicious nodes collude together to perform malicious acts, their activity of network disruption becomes even harder to detect.…”
Section: Fig 2 Wormhole Attack In Reactive Routing Protocolmentioning
confidence: 99%
See 3 more Smart Citations
“…A single malicious node can launch this attack by broadcasting the route request at a high power level [7]. If multiple malicious nodes collude together to perform malicious acts, their activity of network disruption becomes even harder to detect.…”
Section: Fig 2 Wormhole Attack In Reactive Routing Protocolmentioning
confidence: 99%
“…Though no harm is done if the wormhole is used properly for efficient relaying of packets, it puts the attacker in a powerful position compared to other nodes in the network, which the attacker could use in a manner that could compromise the security of the network. [7] …”
Section: Impact Of Wormhole Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Nait-Abdesselam, Bensaou, and Taleb [9] elaborated on identification and evasion system based on load support with diverse courses, and because of crowded packets, it has a hefty load and might give wrong alerts. Khurana and Gupta [10] , [11] suggested method was about total span and utmost scope of nodes SEEEP [10] but had drawbacks to nodes with similar distribution span which was elongated as FEEPVR [11] to help non-identical range or span.…”
Section: Related Workmentioning
confidence: 99%