Secure TORA: Removal of Black Hole Attack Using Twofish Algorithm

@article{Venkatadri2016SecureTR,
  title={Secure TORA: Removal of Black Hole Attack Using Twofish Algorithm},
  author={N. Venkatadri and Krishna R. Reddy},
  journal={2016 IEEE 6th International Conference on Advanced Computing (IACC)},
  year={2016},
  pages={239-244}
}
Ad Hoc wireless network is a type of wireless network, in which there is no any fixed infrastructure. Devices in Ad Hoc network can move around the network within a given range. Currently most of the transactions are performed through the computer networks so they are more susceptible to many physical security threats. One of the major DOS Attacks that degrade the performance of the whole MANET is Black Hole attack. In the presence of black hole attack, nasty nodes are not forward the packets… CONTINUE READING
1 Citations
8 References
Similar Papers

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-8 of 8 references

, ” Encryption and Decryption of data using twofish Algorithm ”

  • Irfan Landge, Tasneem Bharmal, Pooja Narwankar
  • World journal of Science and Technology
  • 2012

An indepth analysis of the effects of IMEP on TORA protocol

  • Lim, Kwan Hui, Amitava Datta
  • IEEE Wireless Communications and Networking…
  • 2012
2 Excerpts

Narwankar,” Encryption and Decryption of data using twofish Algorithm

  • Irfan Landge, Tasneem Bharmal, Pooja
  • World journal of Science and Technology
  • 2012
1 Excerpt

Performance Evolution of Blackhole Attack on VANET ’ s Routing Protocols ”

  • Eman Farag Ahmed
  • International Journal of Software Engineering and…

Similar Papers

Loading similar papers…