Cargando…
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET
Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole. During this they take a path which is the shortest for the place where it has to reach. During sending of message two typ...
Autores principales: | Shukla, Mukul, Joshi, Brijendra Kumar, Singh, Upendra |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8237045/ https://www.ncbi.nlm.nih.gov/pubmed/34219973 http://dx.doi.org/10.1007/s11277-021-08647-1 |
Ejemplares similares
-
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
por: Jen, Shang-Ming, et al.
Publicado: (2009) -
Elliptic curves in cryptography
por: Blake, I, et al.
Publicado: (1999) -
Handbook of elliptic and hyperelliptic curve cryptography
por: Cohen, Henri, et al.
Publicado: (2005) -
Elliptic curves and their applications to cryptography: an introduction
por: Enge, Andreas
Publicado: (1999) -
Elliptic curves: number theory and cryptography
por: Washington, Lawrence C
Publicado: (2008)