عنوان فارسی مقاله: |
رویکردی برای شناسایی حمله کرم چاله در شبکه های ادهاک وسیله نقلیه |
عنوان انگلیسی مقاله: |
An Approach To Detect The Wormhole Attack In Vehicular Adhoc Networks |
چکیده
1. مقدمه
2. کارهای مرتبط
3. حالات حمله مختلف
ب. کرم چاله با استفاده از کانال خارج از باند
4. راه حل پیشنهادی
5. نتیجه گیری و کار آینده
کلمات کلیدی :
NS2 code for An Approach to Detect Wormhole Attack | S-Logixslogix.in/an-approach-to-detect-wormhole-attack-in-aodv-based-manetS-Logix Offers NS2 Project for An Approach to Detect Wormhole Attack in AODV based MANET,NS2 Simulation for Detect Wormhole Attack in AODV based ...a new cluster-based wormhole intrusion detection algorithm for ... - arXivhttps://arxiv.org/pdf/1004.0587by DB Roy - 2010 - Cited by 80 - Related articlesA wormhole attack is a particularly severe attack on MANET routing where two attackers, connected by ... cluster based approach to detect the wormhole attacks.[PDF]Detecting Wormhole Attacks in Wireless Sensor Networkswww.cs.uml.edu/~glchen/papers/wormhole-cipbook07.pdfby Y Xu - Cited by 28 - Related articlesAbstract. Wormhole attacks can destabilize or disable wireless sensor networks. ... Early approaches proposed for detecting wormhole attacks in wireless ad hoc.