European Journal of Applied Engineering and Scientific Research
Abstract
Author(s): Kimia Moradi , Majid Rahiminasab
Progress in networks and technologies of communication have led to emergence of wireless devices in most of our works. People use wireless networks in a wide range of their activities. Among these networks are Ad-Hoc networks that are very applicable. In these networks nodes do the routing operation by their own and there is possibility that the network unexpectedl, experience some changes in topology. One of the most important problems in these networks is security establishment. Various attacks are imposed on these networks and every attack, in its way, threatens the networkÃ?¢Ã?â?¬Ã?Ë?s security. This article pays attention to divisions of attack types and that How much change every attack can make on the network or How can they threaten it? Following using NS2 simulator, we simulate warp algorithm to confront wormhole attack.