2014 9th International Conference on Industrial and Information Systems (ICIIS) 2014
DOI: 10.1109/iciinfs.2014.7036535
|View full text |Cite
|
Sign up to set email alerts
|

WADP: A wormhole attack detection and prevention technique in MANET using modified AODV routing protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…However, it suffers from false positive. WADP is an improved WAP by Juni Biswas [4] for wormhole attack detection. It combines node authentication to remove false positives and helps in exact location mapping of wormhole in a modified AODV routing protocol.…”
Section: Neighbour Discovery Approachmentioning
confidence: 99%
“…However, it suffers from false positive. WADP is an improved WAP by Juni Biswas [4] for wormhole attack detection. It combines node authentication to remove false positives and helps in exact location mapping of wormhole in a modified AODV routing protocol.…”
Section: Neighbour Discovery Approachmentioning
confidence: 99%
“…The efficacy of EyeSim is assessed in terms of detection accuracy. Biswas et al [32] have proposed a novel wormhole attack detection technique in which node authentication has been used to detect malicious nodes and remove the false positive problem that may arise in wormhole detection techniques. Node authentication not only removes false positive but also helps in the mapping exact location of the wormhole and is a kind of double verification for wormhole attack detection.…”
Section: Related Workmentioning
confidence: 99%
“…In [20] work, some modifications have been done in AODV routing protocol to detect and remove wormhole attack in real-world MANET. Wormhole attack detection and prevention algorithm, WADP, has been executed in adjusted AODV Also node authentication has been utilized to recognize malicious nodes and evacuate false positive issue that may emerge in WADP algorithm.…”
Section: Literature Surveymentioning
confidence: 99%