{"title":"自组织网络中虫洞攻击的响应协议分析","authors":"G. Garg, S. Kaushal, Akashdeep Sharma","doi":"10.1109/ICCCNT.2014.6963143","DOIUrl":null,"url":null,"abstract":"Ad-hoc Networks are constantly prone to variety of attacks at different layers because of its features. Wormhole attack is one of the severe attacks which can be implemented in five different modes. This attack acts as a curse as well as boon for the network users. This paper presents the analysis of reactive protocols (AODV, DSR, DYMO, ANODR) with wormhole attack in both mobile and non-mobile ad-hoc networks. Simulations are carried out under Qualnet 4.5.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"102 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Reactive protocols analysis with wormhole attack in ad-hoc networks\",\"authors\":\"G. Garg, S. Kaushal, Akashdeep Sharma\",\"doi\":\"10.1109/ICCCNT.2014.6963143\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ad-hoc Networks are constantly prone to variety of attacks at different layers because of its features. Wormhole attack is one of the severe attacks which can be implemented in five different modes. This attack acts as a curse as well as boon for the network users. This paper presents the analysis of reactive protocols (AODV, DSR, DYMO, ANODR) with wormhole attack in both mobile and non-mobile ad-hoc networks. Simulations are carried out under Qualnet 4.5.\",\"PeriodicalId\":140744,\"journal\":{\"name\":\"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"volume\":\"102 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCNT.2014.6963143\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2014.6963143","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reactive protocols analysis with wormhole attack in ad-hoc networks
Ad-hoc Networks are constantly prone to variety of attacks at different layers because of its features. Wormhole attack is one of the severe attacks which can be implemented in five different modes. This attack acts as a curse as well as boon for the network users. This paper presents the analysis of reactive protocols (AODV, DSR, DYMO, ANODR) with wormhole attack in both mobile and non-mobile ad-hoc networks. Simulations are carried out under Qualnet 4.5.