Login / Signup
Trust System- and Multiple Verification Technique-Based Method for Detecting Wormhole Attacks in MANETs.
Joonsu Ryu
Sungwook Kim
Published in:
IEEE Access (2024)
Keyphrases
</>
experimental evaluation
pairwise
significant improvement
high precision
computational cost
detection method
preprocessing
clustering method
genetic algorithm
segmentation method
watermarking scheme
end to end
edge detection
high accuracy
dynamic programming
cost function
cooperative