Indexed by:
Abstract:
Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting, watch-nodes-based detection and identity-based cryptosystem are used. The simulation results and qualitative analysis demonstrate the performance and cost of the proposed scheme are more advantageous over the some of the previous schemes.
Keyword:
Reprint Author's Address:
Email:
Source :
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS
ISSN: 1875-6891
Year: 2012
Issue: 5
Volume: 5
Page: 878-886
2 . 9 0 0
JCR@2022
ESI Discipline: COMPUTER SCIENCE;
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 1