Volume & Issue no: Volume 4, Issue 6, November - December 2015
____________________________________________________________________________________________________
Title: |
Novel Method for the Detection of Wormhole Attack in Delay Tolerant Network |
Author Name: |
Jyothi D G, Ajay Kumar S N, Dr.Chandra shekara S N |
Abstract: |
ABSTRACT
Wireless communication faces several security risks. In this
paper, we are concerned of a particularly severe security
attack that affects the Delay Tolerant Networks routing
protocols, it is called the wormhole attack. The algorithm uses
the local connectivity information to look for forbidden
substructures in the network connectivity graph. Our proposed
methodology is wholly localized and it does not use any
special hardware or location information of the nodes,
making this technique universally applicable. The objective of
this paper is to develop a methodology to detect the presence
of malicious nodes, causing forbidden structure in the
network, using only local connectivity information.
Key words: wormhole attack, Delay Tolerant Network,
Unit Disk Graph. |
Cite this article: |
Jyothi D G, Ajay Kumar S N, Dr.Chandra shekara S N , "
Novel Method for the Detection of Wormhole Attack in Delay Tolerant Network " , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) ,
Volume 4, Issue 6, November - December 2015 , pp.
153-157 , ISSN 2278-6856.
|
Full Text [PDF] Back to Current Issue |
NOTE: Authors note that paper cannot be withdrawn at any condition once it is accepted. The Team of IJETTCS advise you, do not submit same article to the multiple journals simultaneously. This may create a problem for you. Please wait for review report which will take maximum 01 to 02 week.